National Library of Energy BETA

Sample records for unspecified flaw lets

  1. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  2. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  3. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  4. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  5. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July...

  6. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  7. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  8. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  9. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  10. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  11. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain...

  12. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May...

  13. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  14. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  15. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis...

  16. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions ...

  17. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  18. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  19. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  20. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  1. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  2. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Energy Savers [EERE]

    Security Controls | Department of Energy 6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  3. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  4. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  5. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Broader source: Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  6. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  7. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  8. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  9. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Energy Savers [EERE]

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  10. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  11. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute ... The vendor has issued a fix (16.0.0.282). Addthis Related Articles V-228: RealPlayer ...

  12. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  13. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Energy Savers [EERE]

    Users Access or Modify SSL/TLS Sessions | Department of Energy 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5

  14. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 7: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  15. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be exploited to...

  16. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CTA 7.3.1 and later with Hotfix ESA-2012-034 Addthis Related Articles V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-036: EMC Smarts Network...

  17. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  18. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

  19. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  20. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  1. V-227: VMware Workstation and Player vmware-mount Command Flaw...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root...

  2. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  3. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  4. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  5. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact

    Broader source: Energy.gov [DOE]

    A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service.

  6. V-139: Cisco Network Admission Control Input Validation Flaw...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A...

  7. Flawed reasoning

    SciTech Connect (OSTI)

    Frankena, M.W.; Owen, B.M.

    1993-07-15

    The FERC's failure to investigate the Entergy/GSU merger's effects on market power may force other agencies to examine electric utility mergers on their own. The competitive effects of the proposed merger Entergy and Gulf States Utilities (GSU) will not be further investigated by the Federal Energy Regulatory Commission (FERC), according to a January 1993 order. The FERC's primary justification is that the [open quotes]open access[close quotes] transmission conditions offered by the merging parties eliminated concern over market power in transmission and bulk power. The FERC's reasoning is flawed. If the merger were to lead to an increase in market power, the proposed transmission conditions would not prevent the merged firm from exercising that power. The FERC also justifies its decision not to investigate the competitive effects of the merger on the grounds that no intervenor had demonstrated that present competition between the two systems is more than de minimis. This is not an appropriate standard. Intervenors demonstrated that Entergy's and GSU's transmission system offer alternative contract routes for bulk power between generators and customers. Even if Entergy and GSU both do not actually sell significant amounts of the same transmission-service, an antitrust evaluation should consider whether the availability of a second, independent route constrains the pricing of the first. The FERC's reasoning indicates that it has lost its way in carrying out its responsibilities to protect consumers. Open access to transmission systems may play an important role in increasing competition in bulk power markets. However, the FERC's goal should be to promote competition, not merely to open access for its own sake. In its enthusiasm to secure [open quotes]open access[close quotes], the FERC appears willing to ignore possible reductions in competition.

  8. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  9. Flaw detection and evaluation

    DOE Patents [OSTI]

    Wilks, Robert S. (Plum, PA); Sturges, Jr., Robert H. (Plum, PA)

    1983-01-01

    The invention provides a method of and apparatus for optically inspecting nuclear fuel pellets for surface flaws. The inspection system includes a prism and lens arrangement for scanning the surface of each pellet as the same is rotated. The resulting scan produces data indicative of the extent and shape of each flaw which is employed to generate a flaw quality index for each detected flaw. The flaw quality indexes from all flaws are summed and compared with an acceptable surface quality index. The result of the comparison is utilized to control the acceptance or rejection of the pellet.

  10. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  11. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  12. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  13. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  14. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  15. The HMDS Coating Flaw Removal Tool

    SciTech Connect (OSTI)

    Monticelli, M V; Nostrand, M C; Mehta, N; Kegelmeyer, L; Johnson, M A; Fair, J; Widmayer, C

    2008-10-24

    In many high energy laser systems, optics with HMDS sol gel antireflective coatings are placed in close proximity to each other making them particularly susceptible to certain types of strong optical interactions. During the coating process, halo shaped coating flaws develop around surface digs and particles. Depending on the shape and size of the flaw, the extent of laser light intensity modulation and consequent probability of damaging downstream optics may increase significantly. To prevent these defects from causing damage, a coating flaw removal tool was developed that deploys a spot of decane with a syringe and dissolves away the coating flaw. The residual liquid is evacuated leaving an uncoated circular spot approximately 1mm in diameter. The resulting uncoated region causes little light intensity modulation and thus has a low probability of causing damage in optics downstream from the mitigated flaw site.

  16. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting...

  17. U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

  18. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The Cisco Content Services Gateway: Second Generation provides intelligent network capabilities such as flexible policy management and billing based on deep-packet inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their mobile data networks. A DoS vulnerability exists in the Cisco Content Services Gateway: Second Generation could allow an unauthenticated attacker to cause a device reload by sending crafted ICMP messages to the affected device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID CSCtl79577 ( registered customers only) and has been assigned CVE ID CVE-2011-2064.

  19. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  20. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  1. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  2. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Device Manager (ASDM) Administrative Access * Telnet Access * SSH Access * Virtual ... Security Focus Bugtraq ID: 45768 SecurityTracker Alert ID: 1024963 CVE-2010-4692 ...

  3. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  4. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  5. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  7. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  8. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS ... remote user with the ability to conduct a man-in-the-middle attack on an HTTPS connection ...

  9. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) ...

  10. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the...

  11. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  13. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  14. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g., UDP, TCP) data from the specially crafted IP packet. Nexus 1000v, 5000, and 7000 Series Switches...

  15. U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

  16. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  17. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  18. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  19. Flaw Tolerance for Multiple Fatique Cracks

    SciTech Connect (OSTI)

    Gosselin, Stephen R.; Simonen, Fredric A.; Carter, R. G.

    2005-07-01

    This paper documents important details of the technical bases for changes to Appendix L. Calculations identified aspect ratios for equivalent single cracks (ESC) between the extremes of a 6:1 ratio and a full circumferential crack that can be used in Appendix L flaw tolerance assessments to account for the initiation, growth, and linking of multiple fatigue cracks. Probabilistic fracture mechanics (PFM) calculations determined ESC aspect ratios that result in the same through-wall crack probability as multiple small cracks (0.02 inch depth) that initiate and coalesce. The computations considered two materials (stainless and low alloy steels), three pipe diameters, five cyclic membrane-to-gradient stress ratios and a wide range of primary loads. Subsequent deterministic calculations identified the ESC aspect ratio for the hypothetical reference flaw depth assumptions in Appendix L. This paper also describes computations that compare the Appendix L flaw tolerance allowable operating period for the ESC models with results obtained when the a single default 6:1 aspect ratio reference flaw.

  20. U-144:Juniper Secure Access Input Validation Flaw Permits Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10,...

  1. Procedure for flaw detection in cast stainless steel

    DOE Patents [OSTI]

    Kupperman, David S.

    1988-01-01

    A method of ultrasonic flaw detection in cast stainless steel components incorporating the steps of determining the nature of the microstructure of the cast stainless steel at the site of the flaw detection measurements by ultrasonic elements independent of the component thickness at the site; choosing from a plurality of flaw detection techniques, one such technique appropriate to the nature of the microstructure as determined and detecting flaws by use of the chosen technique.

  2. U-001:Symantec IM Manager Input Validation Flaws

    Broader source: Energy.gov [DOE]

    Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks.

  3. Ultrasonic Flaw Detection of Cracks and Machined Flaws as Observed Through Austenitic Stainless Steel Piping Welds

    SciTech Connect (OSTI)

    Anderson, Michael T.; Cinson, Anthony D.; Crawford, Susan L.; Cumblidge, Stephen E.; Diaz, Aaron A.

    2009-07-01

    Piping welds in the pressure boundary of light water reactors (LWRs) are subject to a volumetric examination based on Section XI of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code. Due to access limitations and high background radiation levels, the technique used is primarily ultrasonic rather than radiographic. Many of the austenitic welds in safety-related piping systems provide limited access to both sides of the weld, so a far-side examination is necessary. Historically, far-side inspections have performed poorly because of the coarse and elongated grains that make up the microstructures of austenitic weldments. The large grains cause the ultrasound to be scattered, attenuated, and redirected. Additionally, grain boundaries or weld geometry may reflect coherent ultrasonic echoes, making flaw detection and discrimination a more challenging endeavor. Previous studies conducted at the Pacific Northwest National Laboratory (PNNL) on ultrasonic far-side examinations in austenitic piping welds involved the application of conventional transducers, use of low-frequency Synthetic Aperture Focusing Techniques (SAFT), and ultrasonic phased-array (PA) methods on specimens containing implanted thermal fatigue cracks and machined reflectors [1-2]. From these studies, PA inspection provided the best results, detecting nearly all of the flaws from the far side. These results were presented at the Fifth International Conference on NDE in Relation to Structural Integrity for Nuclear and Pressurised Components in 2006. This led to an invitation to examine field-removed specimens containing service-induced intergranular stress corrosion cracks (IGSCC) at the Electric Power Research Institute’s (EPRI) Nondestructive Evaluation (NDE) Center, in Charlotte, North Carolina. Results from this activity are presented.

  4. U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system.

  5. U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.

  6. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  7. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  8. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  9. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  10. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  11. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be...

  12. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  13. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login ... and Local Users Gain Elevated Privileges V-076: Cisco Wireless LAN Controller Bugs Let ...

  14. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  15. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  16. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  17. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  18. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  19. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  20. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial...

  1. V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

  2. V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

  3. Fabrication Flaw Density and Distribution In Repairs to Reactor Pressure Vessel and Piping Welds

    SciTech Connect (OSTI)

    GJ Schuster, FA Simonen, SR Doctor

    2008-04-01

    The Pacific Northwest National Laboratory is developing a generalized fabrication flaw distribution for the population of nuclear reactor pressure vessels and for piping welds in U.S. operating reactors. The purpose of the generalized flaw distribution is to predict component-specific flaw densities. The estimates of fabrication flaws are intended for use in fracture mechanics structural integrity assessments. Structural integrity assessments, such as estimating the frequency of loss-of-coolant accidents, are performed by computer codes that require, as input, accurate estimates of flaw densities. Welds from four different reactor pressure vessels and a collection of archived pipes have been studied to develop empirical estimates of fabrication flaw densities. This report describes the fabrication flaw distribution and characterization in the repair weld metal of vessels and piping. This work indicates that large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the ends of the repair cavities. Parametric analysis using an exponential fit is performed on the data. The relevance of construction records is established for describing fabrication processes and product forms. An analysis of these records shows there was a significant change in repair frequency over the years when these components were fabricated. A description of repair flaw morphology is provided with a discussion of fracture mechanics significance. Fabrication flaws in repairs are characterized using optimized-access, high-sensitivity nondestructive ultrasonic testing. Flaw characterizations are then validated by other nondestructive evaluation techniques and complemented by destructive testing.

  4. Sandia Wind-Turbine Blade Flaw Detection Experiments in Denmark

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind-Turbine Blade Flaw Detection Experiments in Denmark - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense

  5. Defining a Possible Low LET Bystander Effect

    SciTech Connect (OSTI)

    Charles R. Geard

    2009-05-04

    Current radiation protection guidelines assume a linear response to ionizing radiations down through doses where epidemiological studies provide very limited to no information as to the propriety of such assumptions. The bystander response is a non-targeted effect which might impact such guidelines. These studies while clearly affirming a bystander response for high LET radiations, do not provide such affirmation for environmentally relevant low dose, low LET radiations. Caution and further study are necessary before making judgements that could impact on current standards.

  6. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  7. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  8. Unspecified technologies | Open Energy Information

    Open Energy Info (EERE)

    Solar Thermal Process Heat Solar Water Heat Energy Storage Wind Yes Public Sector Energy Efficiency Aggregation Program State Grant Program Illinois Fed. Government Institutional...

  9. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting and URL Redirection Attacks | Department of Energy 12: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other

  10. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  11. Eddy current probe and method for flaw detection in metals

    DOE Patents [OSTI]

    Watjen, J.P.

    1987-06-23

    A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner. 9 figs.

  12. Fabrication Flaw Density and Distribution in the Repairs of Reactor Pressure Vessels

    SciTech Connect (OSTI)

    Schuster, George J.; Doctor, Steven R.; Simonen, Fredric A.

    2006-02-15

    The Pacific Northwest National Laboratory (PNNL) is developing a generalized flaw size and density distribution for the population of U.S. reactor pressure vessels (RPVs). The purpose of the generalized flaw distribution is to predict vessel specific flaw rates for use in probabilistic fracture mechanics calculations that estimate vessel failure probability. Considerable progress has been made on the construction of an engineering data base of fabrication flaws in U.S. nuclear RPVs. The fabrication processes and product forms used to construct U.S. RPVs are represented in the data base. A validation methodology has been developed for characterizing the flaws for size, shape, orientation, and composition. The relevance of construction records has been established for describing fabrication processes and product forms. The fabrication flaws were detected in material removed from cancelled nuclear power plants using high sensitivity nondestructive ultrasonic testing, and validated by other nondestructive evaluation (NDE) techniques, and complemented by destructive testing. This paper describes research that has generated data on welding flaws, which indicated that the largest flaws occur in weld repairs. Recent research results confirm that repair flaws are complex in composition and may include cracks on the repair ends. Section III of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code for nuclear power plant components requires radiographic examinations (RT) of welds and requires repairs for RT indications that exceed code acceptable sizes. PNNL has previously obtained the complete construction records for two RPVs. Analysis of these records show a significant change in repair frequency.

  13. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  14. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities...

  15. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August ... Addthis Related Articles V-211: IBM iNotes Multiple Vulnerabilities U-198: IBM Lotus ...

  16. T-602: BlackBerry Enterprise Server Input Validation Flaw in...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

  17. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  18. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  19. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  20. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  1. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  2. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  3. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  4. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  5. Development of flaw acceptance criteria for aging management of spent nuclear fuel multi-purpose canisters

    SciTech Connect (OSTI)

    Lam, Poh -Sang; Sindelar, Robert L.

    2015-03-09

    A typical multipurpose canister (MPC) is made of austenitic stainless steel and is loaded with spent nuclear fuel assemblies. The canister may be subject to service-induced degradation when it is exposed to aggressive atmospheric environments during a possibly long-term storage period if the permanent repository is yet to be identified and readied. Because heat treatment for stress relief is not required for the construction of an MPC, stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic in-service Inspection. The first-order instability flaw sizes has been determined with bounding flaw configurations, that is, through-wall axial or circumferential cracks, and part-through-wall long axial flaw or 360° circumferential crack. The procedure recommended by the American Petroleum Institute (API) 579 Fitness-for-Service code (Second Edition) is used to estimate the instability crack length or depth by implementing the failure assessment diagram (FAD) methodology. The welding residual stresses are mostly unknown and are therefore estimated with the API 579 procedure. It is demonstrated in this paper that the residual stress has significant impact on the instability length or depth of the crack. The findings will limit the applicability of the flaw tolerance obtained from limit load approach where residual stress is ignored and only ligament yielding is considered.

  6. Development of flaw acceptance criteria for aging management of spent nuclear fuel multiple-purpose canisters

    SciTech Connect (OSTI)

    Lam, P.; Sindelar, R.

    2015-03-09

    A typical multipurpose canister (MPC) is made of austenitic stainless steel and is loaded with spent nuclear fuel assemblies. The canister may be subject to service-induced degradation when it is exposed to aggressive atmospheric environments during a possibly long-term storage period if the permanent repository is yet to be identified and readied. Because heat treatment for stress relief is not required for the construction of an MPC, stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic In-service Inspection. The first-order instability flaw sizes has been determined with bounding flaw configurations, that is, through-wall axial or circumferential cracks, and part-through-wall long axial flaw or 360° circumferential crack. The procedure recommended by the American Petroleum Institute (API) 579 Fitness-for-Service code (Second Edition) is used to estimate the instability crack length or depth by implementing the failure assessment diagram (FAD) methodology. The welding residual stresses are mostly unknown and are therefore estimated with the API 579 procedure. It is demonstrated in this paper that the residual stress has significant impact on the instability length or depth of the crack. The findings will limit the applicability of the flaw tolerance obtained from limit load approach where residual stress is ignored and only ligament yielding is considered.

  7. Solar Decathlon 2015: Let the Competition Begin | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let the Competition Begin Solar Decathlon 2015: Let the Competition Begin February 13, 2014 - 1:00pm Addthis The Solar Decathlon competition has provided more than 17,000 college students with the training and hands-on experience. This video highlights how the competition is shaping the careers of the students involved and making sustainable home design popular. | Video by Matty Greene, Energy Department. Richard King Richard King Director, Solar Decathlon Solar Decathlon 2015 Team Facts: This

  8. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Obtain Database Contents | Department of Energy 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5

  9. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric Grigorian,

  10. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  11. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  12. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attacks | Department of Energy 9: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740

  13. Anisotropic determination and correction for ultrasonic flaw detection by spectral analysis

    DOE Patents [OSTI]

    Adler, Laszlo; Von Cook, K.; Simpson, Jr., William A.; Lewis, D. Kent

    1978-01-01

    The anisotropic nature of a material is determined by measuring the velocity of an ultrasonic longitudinal wave and a pair of perpendicular ultrasonic shear waves through a sample of the material each at a plurality of different angles in three planes orthogonal to each other. The determined anisotropic nature is used as a correction factor in a spectral analyzing system of flaw determination.

  14. Apparatus and method for detecting and/or measuring flaws in conductive material

    DOE Patents [OSTI]

    Hockey, Ronald L. (Richland, WA); Riechers, Douglas M. (Richland, WA)

    2000-01-01

    The present invention uses a magnet and sensor coil unilaterial and in relative motion to a conductive material, to measure perturbation or variation in the magnetic field in the presence of a flaw. A liftoff compensator measures a distance between the conductive material and the magnet.

  15. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Energy Savers [EERE]

    Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric

  16. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  17. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 -...

  18. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

  19. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  20. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM:...

  1. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  2. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  3. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am...

  4. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service ...

  5. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote ... The vendor has issued a fix (5.3SP1). Addthis Related Articles V-084: RSA Archer eGRC ...

  6. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 -...

  7. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  8. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  9. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the...

  10. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target...

  11. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs...

  12. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  13. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  14. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  15. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April...

  16. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  17. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain...

  18. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  19. Improved multi-directional eddy current inspection test apparatus for detecting flaws in metal articles

    DOE Patents [OSTI]

    Nance, Roy A.; Hartley, William H.; Caffarel, Alfred J.

    1984-01-01

    Apparatus is described for detecting flaws in a tubular workpiece in a single scan. The coils of a dual coil bobbin eddy current inspection probe are wound at a 45.degree. angle to the transverse axis of the probe, one coil having an angular position about the axis about 90.degree. relative to the angular position of the other coil, and the angle of intersection of the planes containing the coils being about 60.degree..

  20. Thermal wave image processing for characterization of subsurface of flaws in materials

    SciTech Connect (OSTI)

    Gopalan, K.; Gopalsami, N.

    1993-08-01

    Infrared images resulting from back-scattered thermal waves in composite materials are corrupted by instrument noise and sample heat-spread function. This paper demonstrates that homomorphic deconvolution and {open_quotes}demultiplication{close_quotes} result in enhanced image quality for characterization of subsurface flaws in Kevlar and graphics composites. The choice of processing depends on the material characteristics and the extent of noise in the original image.

  1. Intense X-rays expose tiny flaws in 3-D printed titanium that can lead to

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    breakage over time | Argonne National Laboratory Intense X-rays expose tiny flaws in 3-D printed titanium that can lead to breakage over time By Katie Elyce Jones * March 4, 2016 Tweet EmailPrint Titanium is strong but light - a desirable property among metals. In the twentieth century, titanium was used in military aircraft and equipment and commercial jets. Today, we find this tough and flexible metal all around us - in sports gear, tools, surgical and dental implants, prosthetics,

  2. Stress-intensity-factor influence coefficients for semielliptical inner-surface flaws in clad pressure vessels

    SciTech Connect (OSTI)

    Keeney, J.A.; Bryson, J.W.

    1995-12-31

    A problem of particular interest in pressure vessel technology is the calculation of accurate stress-intensity factors for semielliptical surface cracks in cylinders. Computing costs for direct solution techniques can be prohibitive when applied to three-dimensional (3-D) geometries with time-varying boundary conditions such as those associated with pressurized thermal shock. An alternative superposition technique requires the calculation of a set of influence coefficients for a given 3-D crack model that can be superimposed to obtain mode-I stress-intensity factors. This paper presents stress-intensity-factor influence coefficients (SIFICs) for axially and circumferentially oriented finite-length semielliptical inner-surface flaws with aspect ratios (total crack length (2c) to crack depth (a)) of 2, 6, and 10 for clad cylinders having an internal radius to wall thickness (t) ratio of 10. SIFICs are computed for flaw depths in the range of 0.01 {le} a/t {le} 0.5 and two cladding thicknesses. The incorporate of this SIFIC data base in fracture mechanics codes will facilitate the generation of fracture mechanics solutions for a wide range of flaw geometries as may be required in structural integrity assessments of pressurized-water and boiling-water reactors.

  3. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  4. Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station

    SciTech Connect (OSTI)

    Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

    2012-06-01

    During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

  5. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  6. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  7. Effect of stainless steel weld overlay cladding on the structural integrity of flawed steel plates in bending. Series 1

    SciTech Connect (OSTI)

    Corwin, W.R.; Robinson, G.C.; Nanstad, R.K.; Merkle, J.G.; Berggren, R.G.; Goodwin, G.M.; Swain, R.L.; Owings, T.D.

    1985-04-01

    The Heavy-Section Steel Technology (HSST) Stainless Steel Cladding Evaluations were undertaken to study the interaction of stainless steel cladding on the inside surface of a reactor pressure vessel with flaws initiating and propagating in base metal. With the more recent focus of safety studies on overcooling type transients, for which the behavior of small flaws is important, stainless steel cladding may have a key role in controlling the propagation and/or arrest of propagating flaws. A complicating factor in understanding the role of stainless steel cladding in this setting is the scarcity of data on its fracture toughness as a function of radiation dose and the fabrication process. The initial phase of the HSST evaluations addresses this question by testing the response of 51-mm-thick flawed plates clad with single-wire, submerged-arc weld overlays of different toughness levels. The tests completed indicate that cladding of moderate toughness had a limited ability to enhance the structural arrest toughness of a beam in bending. The specimen design and fabrication techniques employed for this first completed series of tests resulted in flaw and specimen configurations that prevented adequate control of the stress state at pop-in of the hydrogen-charged electron-beam welds. As a result, analyses of the tests by two approximate techniques and by the ORMGEN-ADINA-ORVIRT finite-element programs were not completely consistent.

  8. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Gain Elevated Privileges | Department of Energy 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities

  9. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  10. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big

    Energy Savers [EERE]

    Rewards | Department of Energy Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards, as posted on the U.S. Department of Energy's Better Buildings Neighborhood Program website. PDF icon Spotlight on Austin, Texas More Documents & Publications Spotlight on Austin, Texas: Best Offer Ever Produces Upgrades in Record Time Spotlight on

  11. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sensitive Information | Department of Energy 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat

  12. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  13. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote ... Vendor fixes are available at Cisco Support Addthis Related Articles V-048: Cisco Wireless ...

  14. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect (OSTI)

    Boonin, David Magnus

    2009-11-15

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  15. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  16. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  17. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  18. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Energy Savers [EERE]

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  19. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  20. Non-destructive evaluation means and method of flaw reconstruction utilizing an ultrasonic multi-viewing transducer data acquistion system

    DOE Patents [OSTI]

    Thompson, Donald O. (Ames, IA); Wormley, Samuel J. (Ames, IA)

    1989-03-28

    A multi-viewing ultrasound transducer acquisition system for non-destructive evaluation, flaw detection and flaw reconstruction in materials. A multiple transducer assembly includes a central transducer surrounded by a plurality of perimeter transducers, each perimeter transducer having an axis of transmission which can be angularly oriented with respect to the axis of transmission of the central transducer to intersect the axis of transmission of the central transducer. A control apparatus automatically and remotely positions the transducer assembly with respect to the material by a positioning apparatus and adjusts the pe GRANT REFERENCE This invention was conceived and reduced to practice at least in part under a grant from the Department of Energy under Contract No. W-7407-ENG-82.

  1. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  2. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

  3. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  4. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in...

  5. Let's Try That Again: Selling the Teapot Dome Oil Field | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Let's Try That Again: Selling the Teapot Dome Oil Field Let's Try That Again: Selling the Teapot Dome Oil Field January 30, 2015 - 11:28am Addthis A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. Allison Lantero Allison Lantero Digital Content Specialist, Office of Public Affairs In 1922, President Warren Harding's Interior Secretary Albert Fall found

  6. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  7. Electromagnetic methods for measuring materials properties of cylindrical rods and array probes for rapid flaw inspection

    SciTech Connect (OSTI)

    Sun, Haiyan

    2005-05-01

    The case-hardening process modifies the near-surface permeability and conductivity of steel, as can be observed through changes in alternating current potential drop (ACPD) along a rod. In order to evaluate case depth of case hardened steel rods, analytical expressions are derived for the alternating current potential drop on the surface of a homogeneous rod, a two-layered and a three-layered rod. The case-hardened rod is first modeled by a two-layer rod that has a homogeneous substrate with a single, uniformly thick, homogeneous surface layer, in which the conductivity and permeability values differ from those in the substrate. By fitting model results to multi-frequency ACPD experimental data, estimates of conductivity, permeability and case depth are found. Although the estimated case depth by the two-layer model is in reasonable agreement with the effective case depth from the hardness profile, it is consistently higher than the effective case depth. This led to the development of the three-layer model. It is anticipated that the new three-layered model will improve the results and thus makes the ACPD method a novel technique in nondestructive measurement of case depth. Another way to evaluate case depth of a case hardened steel rod is to use induction coils. Integral form solutions for an infinite rod encircled by a coaxial coil are well known, but for a finite length conductor, additional boundary conditions must be satisfied at the ends. In this work, calculations of eddy currents are performed for a two-layer conducting rod of finite length excited by a coaxial circular coil carrying an alternating current. The solution is found using the truncated region eigenfunction expansion (TREE) method. By truncating the solution region to a finite length in the axial direction, the magnetic vector potential can be expressed as a series expansion of orthogonal eigenfunctions instead of as a Fourier integral. Closed-form expressions are derived for the electromagnetic field in the presence of a finite a two-layer rod and a conductive tube. The results are in very good agreement with those obtained by using a 2D finite element code. In the third part, a new probe technology with enhanced flaw detection capability is described. The new probe can reduce inspection time through the use of multiple Hall sensors. A prototype Hall array probe has been built and tested with eight individual Hall sensor ICs and a racetrack coil. Electronic hardware was developed to interface the probes to an oscilloscope or an eddy current instrument. To achieve high spatial resolution and to limit the overall probe size, high-sensitivity Hall sensor arrays were fabricated directly on a wafer using photolithographic techniques and then mounted in their unencapsulated form. The electronic hardware was then updated to interface the new probes to a laptop computer.

  8. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Local Users Gain Elevated Privileges | Department of Energy 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure

  9. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the price of solar energy systems in the United States. <a href="http://www.energy.gov/eere/articles/help-solve-solar-s-big-challenge">Learn more about what the Energy Department is doing to lower soft costs and increase deployment of solar energy systems.</a> | Infographic by SunShot Learn how soft costs are

  10. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  11. Let's Keep Talking: Women in STEM Tweet Up | Department of Energy

    Office of Environmental Management (EM)

    Let's Keep Talking: Women in STEM Tweet Up Let's Keep Talking: Women in STEM Tweet Up April 11, 2012 - 2:37pm Addthis The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department file photo The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department

  12. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  13. Don't Let Your Money and Hot Water Go Down the Drain | Department of Energy

    Office of Environmental Management (EM)

    Don't Let Your Money and Hot Water Go Down the Drain Don't Let Your Money and Hot Water Go Down the Drain December 9, 2008 - 4:00am Addthis John Lippert Do you look at your retirement savings statements and feel like you're sending your money down the drain? Do you deposit more money each paycheck into your retirement account, but find the balance goes down, not up? Pssst, want to invest in a "sure thing?" No, this isn't a scam. It's a device that has no moving parts to break down, but

  14. Effects of estrogen and gender on cataractogenesis induced by high-LET radiation

    SciTech Connect (OSTI)

    Henderson, M.A.; Rusek, A.; Valluri, S.; Garrett, J.; Lopez, J.; Caperell-Grant, A.; Mendonca, M.; Bigsby, R.; Dynlacht, J.

    2010-02-01

    Planning for long-duration manned lunar and interplanetary missions requires an understanding of radiation-induced cataractogenesis. Previously, it was demonstrated that low-linear energy transfer (LET) irradiation with 10 Gy of {sup 60}Co {gamma} rays resulted in an increased incidence of cataracts in male rats compared to female rats. This gender difference was not due to differences in estrogen, since male rats treated with the major secreted estrogen 17-{beta}-estradiol (E2) showed an identical increase compared to untreated males. We now compare the incidence and rate of progression of cataracts induced by high-LET radiation in male and female Sprague-Dawley rats. Rats received a single dose of 1 Gy of 600 MeV {sup 56}Fe ions. Lens opacification was measured at 2-4 week intervals with a slit lamp. The incidence and rate of progression of radiation-induced cataracts was significantly increased in the animals in which estrogen was available from endogenous or exogenous sources. Male rats with E2 capsules implanted had significantly higher rates of progression compared to male rats with empty capsules implanted (P = 0.025) but not compared to the intact female rats. These results contrast with data obtained after low-LET irradiation and suggest the possibility that the different types of damage caused by high- and low-LET radiation may be influenced differentially by steroid sex hormones.

  15. SU-E-T-555: A Protontherapy Inverse Treatment Planning System Prototype with Linear Energy Transfer (LET) Optimization

    SciTech Connect (OSTI)

    Sanchez-Parcerisa, D; Carabe-Fernandez, A

    2014-06-01

    Purpose: Develop and benchmark an inverse treatment planning system (TPS) for proton radiotherapy integrating fast analytical dose and LET calculations in patient geometries and a dual objective function with both dose and LET components, enabling us to apply optimization techniques to improve the predicted outcome of treatments based on radiobiological models. Methods: The software package was developed in MATLAB and implements a fluence-dose calculation technique based on a pencil beam model for dose calculations and a 3D LET model based on the extension of the LET in the radial direction as a function of the predicted radiological pathway. Both models were benchmarked against commissioning data from our institution, dose calculations performed with a commercial treatment planning system and Monte Carlo simulations. The optimization is based on the adaptive simulated annealing approach . Results: The dose and LET calculations were tested in a water phantom and several real patient treatments. The pass rate for the gamma index analysis (3%/3mm) test was above 90% for all test cases analyzed, and the calculation time was of the order of seconds. The inverse planning module produced plans with a significantly higher mean LET in the target compared to traditional plans, without any loss of target coverage. The clinical relevance of this improvement is under consideration . Conclusion: The developed treatment planning system is a valuable clinical and research tool that enables us to incorporate LET effects into proton radiotherapy planning in a streamlined fashion.

  16. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  17. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  18. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Workforce All About Contractors Austin Energy, a municipally owned utility, has a long history of collaborating closely with the building contractors in its area to deliver energy efficiency programs, which benefits both parties involved. Because contractors understand that Austin Energy has made a long-term commitment to supporting energy efficiency, they have been willing to invest time and money into the technical

  19. Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material

    DOE Patents [OSTI]

    Panitz, Janda K. (Sandia Park, NM); Reed, Scott T. (Albuquerque, NM); Ashley, Carol S. (Albuquerque, NM); Neiser, Richard A. (Albuquerque, NM); Moffatt, William C. (Albuquerque, NM)

    1999-01-01

    Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties.

  20. Final Assessment of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station

    SciTech Connect (OSTI)

    Anderson, Michael T.; Diaz, Aaron A.; Cinson, Anthony D.; Crawford, Susan L.; Prowant, Matthew S.; Doctor, Steven R.

    2014-03-24

    PNNL conducted a technical assessment of the NDE issues and protocols that led to missed detections of several axially oriented flaws in a steam generator primary inlet dissimilar metal weld at North Anna Power Station, Unit 1 (NAPS-1). This particular component design exhibits a significant outside-diameter (OD) taper that is not included as a blind performance demonstration mock-up within the industrys Performance Demonstration Initiative, administered by EPRI. For this reason, the licensee engaged EPRI to assist in the development of a technical justification to support the basis for a site-specific qualification. The service-induced flaws at NAPS-1 were eventually detected as a result of OD surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the dissimilar metal weld. A total of five axially oriented flaws were detected in varied locations around the weld circumference. The field volumetric examination that was conducted at NAPS-1 was a non-encoded, real-time manual ultrasonic examination. PNNL conducted both an initial assessment, and subsequently, a more rigorous technical evaluation (reported here), which has identified an array of NDE issues that may have led to the subject missed detections. These evaluations were performed through technical reviews and discussions with NRC staff, EPRI NDE Center personnel, industry and ISI vendor personnel, and ultrasonic transducer manufacturers, and laboratory tests, to better understand the underlying issues at North Anna.

  1. Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material

    DOE Patents [OSTI]

    Panitz, J.K.; Reed, S.T.; Ashley, C.S.; Neiser, R.A.; Moffatt, W.C.

    1999-07-20

    Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties. 6 figs.

  2. A FRAMEWORK TO DEVELOP FLAW ACCEPTANCE CRITERIA FOR STRUCTURAL INTEGRITY ASSESSMENT OF MULTIPURPOSE CANISTERS FOR EXTENDED STORAGE OF USED NUCLEAR FUEL

    SciTech Connect (OSTI)

    Lam, P.; Sindelar, R.; Duncan, A.; Adams, T.

    2014-04-07

    A multipurpose canister (MPC) made of austenitic stainless steel is loaded with used nuclear fuel assemblies and is part of the transfer cask system to move the fuel from the spent fuel pool to prepare for storage, and is part of the storage cask system for on-site dry storage. This weld-sealed canister is also expected to be part of the transportation package following storage. The canister may be subject to service-induced degradation especially if exposed to aggressive environments during possible very long-term storage period if the permanent repository is yet to be identified and readied. Stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone because the construction of MPC does not require heat treatment for stress relief. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic Inservice Inspection. The external loading cases include thermal accident scenarios and cask drop conditions with the contribution from the welding residual stresses. The determination of acceptable flaw size is based on the procedure to evaluate flaw stability provided by American Petroleum Institute (API) 579 Fitness-for-Service (Second Edition). The material mechanical and fracture properties for base and weld metals and the stress analysis results are obtained from the open literature such as NUREG-1864. Subcritical crack growth from stress corrosion cracking (SCC), and its impact on inspection intervals and acceptance criteria, is not addressed.

  3. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  4. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  5. Shallow Flaws Under Biaxial Loading Conditions, Part II: Application of a Weibull Stress Analysis of the Cruciform Bend Specimen Using a Hydrostatic Stress Criterion

    SciTech Connect (OSTI)

    Bass, B.R.; McAfee, W.J.; Williams, P.T.

    1999-08-01

    Cruciform beam fracture mechanics specimensl have been developed in the Heavy Section Steel Technology (HSST) Program at Oak Ridge National Laboratory (ORNL) to introduce a prototypic, far- field, out-of-plane biaxird bending stress component in the test section that approximates the nonlinear biaxial stresses resulting from pressurized-thernxd-shock or pressure-temperature loading of a nuclear reactor pressure vessel (RPV). Matrices of cruciform beam tests were developed to investigate and quantify the effects of temperature, biaxial loading, and specimen size on fracture initiation toughness of two-dimensional (constant depth), shtdlow, surface flaws. Tests were conducted under biaxial load ratios ranging from uniaxial to equibiaxial. These tests demonstrated that biaxial loading can have a pronounced effect on shallow-flaw fracture toughness in the lower transition temperature region for RPV materials. Two and three- parameter Weibull models have been calibrated using a new scheme (developed at the University of Illinois) that maps toughness data from test specimens with distinctly different levels of crack-tip constraint to a small scale yielding (SSY) Weibull stress space. These models, using the new hydrostatic stress criterion in place of the more commonly used maximum principal stress in the kernel of the OW integral definition, have been shown to correlate the experimentally observed biaxiaI effect in cruciform specimens, thereby providing a scaling mechanism between uniaxial and biaxial loading states.

  6. Fatal Flaw Analysis of Utility-Scale Wind Turbine Generators at the West Haymarket Joint Public Agency. A Study Prepared in Partnership with the Environmental Protection Agency for the RE-Powering America's Land Initiative: Siting Renewable Energy on Potentially Contaminated Land and Mine Sites

    SciTech Connect (OSTI)

    Roberts, J. O.; Mosey, G.

    2013-08-01

    Fatal flaw analysis of utility-scale wind turbines at the West Haymarket Joint Public Agency brownfields site in Lincoln, Nebraska, funded by EPA.

  7. SU-E-T-354: Peak Temperature Ratio of TLD Glow Curves to Investigate the Spatial Dependence of LET in a Clinical Proton Beam

    SciTech Connect (OSTI)

    Reft, C [UniversityChicago, Chicago, IL (United States); Pankuch, M; Ramirez, H [ProCure Treatment Centers, Warrenville, IL (United States)

    2014-06-01

    Purpose: Use the ratio of the two high temperature peaks (HTR) in TLD 700 glow curves to investigate spatial dependence of the linear energy transfer (LET) in proton beams. Studies show that the relative biological effectiveness (RBE) depends upon the physical dose as well as its spatial distribution. Although proton therapy uses a spatially invariant RBE of 1.1, studies suggest that the RBE increases in the distal edge of a spread out Bragg peak (SOBP) due to the increased LET. Methods: Glow curve studies in TLD 700 show that the 280 C temperature peak is more sensitive to LET radiation than the 210 C temperature peak. Therefore, the areas under the individual temperature peaks for TLDs irradiated in a proton beam normalized to the peak ratio for 6 MV photons are used to determine the HTR to obtain information on its LET. TLD 700 chips with dimensions 0.310.310.038 cc are irradiated with 90 MeV protons at varying depths in a specially designed blue wax phantom to investigate LET spatial dependence. Results: Five TLDs were placed at five different depths of the percent depth dose curve (PDD) of range 16.2 cm: center of the SOPB and approximately at the 99% distal edge, 90%, 75% and 25% of the PDD, respectively. HTR was 1.3 at the center of the SOBP and varied from 2.2 to 3.9 which can be related to an LET variation from 0.5 to 18 KeV/? via calibration with radiation beams of varying LET. Conclusion: HTR data show a spatially invariant LET slightly greater than the 6 MV radiations in the SOBP, but a rapidly increasing LET at the end of the proton range. These results indicate a spatial variation in RBE with potential treatment consequences when selecting treatment margins to minimize the uncertainties in proton RBE.

  8. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect (OSTI)

    J.LESIE REDPATH, PH.D.

    2011-03-29

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker, gamma-H2AX, will be studied.

  9. In-service Inspection Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density and Size Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements

    SciTech Connect (OSTI)

    Sullivan, Edmund J.; Anderson, Michael T.; Norris, Wallace

    2012-09-17

    Pressurized thermal shock (PTS) events are system transients in a pressurized water reactor (PWR) in which there is a rapid operating temperature cool-down that results in cold vessel temperatures with or without repressurization of the vessel. The rapid cooling of the inside surface of the reactor pressure vessel (RPV) causes thermal stresses that can combine with stresses caused by high pressure. The aggregate effect of these stresses is an increase in the potential for fracture if a pre-existing flaw is present in a material susceptible to brittle failure. The ferritic, low alloy steel of the reactor vessel beltline adjacent to the core, where neutron radiation gradually embrittles the material over the lifetime of the plant, can be susceptible to brittle fracture. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (50.61), Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events, adopted on July 23, 1985, establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. The U.S. Nuclear Regulatory Commission (NRC) completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed a rule, 50.61a, published on January 4, 2010, entitled Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock Events (75 FR 13). Use of the new rule by licensees is optional. The 50.61a rule differs from 50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants. These analyses are intended to determine if the actual flaw density and size distribution in the licensees reactor vessel beltline welds are bounded by the flaw density and size distribution values used in the PTS technical basis. Under a contract with the NRC, Pacific Northwest National Laboratory (PNNL) has been working on a program to assess the ability of current inservice inspection (ISI)-ultrasonic testing (UT) techniques, as qualified through ASME Code, Appendix VIII, Supplements 4 and 6, to detect small fabrication or inservice-induced flaws located in RPV welds and adjacent base materials. As part of this effort, the investigators have pursued an evaluation, based on the available information, of the capability of UT to provide flaw density/distribution inputs for making RPV weld assessments in accordance with 50.61a. This paper presents the results of an evaluation of data from the 1993 Browns Ferry Nuclear Plant, Unit 3, Spirit of Appendix VIII reactor vessel examination, a comparison of the flaw density/distribution from this data with the distribution in 50.61a, possible reasons for differences, and plans and recommendations for further work in this area.

  10. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  11. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  12. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  13. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  14. U-021: Cisco Unified Communications Manager Directory Traversal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability...

  15. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive...

  16. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  17. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  18. U-188: MySQL User Login Security Bypass and Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

  19. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device.

  20. Oxidative Stress and Skeletal Health with Low-Dose, Low-LET (Linear Energy Transfer) Ionizing Radiation

    SciTech Connect (OSTI)

    Globus, Ruth K.

    2014-11-03

    We performed in vivo and in vitro experiments to accomplish the following specific aims of this project: 1) determine if low dose, low LET radiation affects skeletal remodeling at structural, cellular and molecular levels and 2) determine if low dose, low LET radiation modulates skeletal health during aging via oxidative mechanisms. A third aim is supported by NASA supplement to this DOE grant focusing on the influence of high LET radiation on bone. A series of experiments were conducted at the NASA Space Radiation Laboratory at Brookhaven, NSRL-BNL, using iron (56Fe) or a sequential exposure to protons / iron / protons, and separate experiments at NASA Ames Research Center (ARC) using 137Cs. The following provides a summary of key findings. (1) Exposure of nine-week old female mice to priming doses of gamma radiation (10cGy x 5) did not significantly affect bone volume/total volume (BV/TV) or microarchitecture as analyzed by 3D microcomputed tomography. As expected, exposure to the challenge dose of 2 Gy gamma irradiation resulted in significant decreases in BV/TV. The priming dose combined with the 2Gy challenge dose had no further effect on BV/TV compared to challenge dose alone, with the sole exception of the Structural Model Index (SMI). SMI reflects the ratio of rods-to-plates in cancellous bone tissue, such that higher SMI values indicate a tendency toward a weaker structure compared to lower SMI values. Mice treated with both priming and challenge dose had 25% higher SMI values compared to sham-irradiated controls and 7% higher values compared to mice treated with the challenge dose alone. Thus, although this priming regimen had relatively modest effects on cancellous tissue, the difference in SMI suggests this fractionated priming doses have adverse, rather than beneficial, effects on bone structure. (2) In 10-week old male mice, a single exposure to 100cGy of 137Cs reduces trabecular bone number and connectivity density by 20% and 36% respectively one month after irradiation (IR). At four months post-IR, these animals were comparable to sham-treated controls with regards to the abovementioned structural parameters. Irradation at 1 or 10 cGy did not result in any significant changes in bone structural parameters. (3) Irradiation of 16-wk old male mice with high doses of 56Fe or proton (50 or 200cGy), but not at low doses (5 or 10cGy), showed a similar loss of cancellous BV/TV and trabecular number at five weeks post-IR. (4) Age-related bone loss overtook acute radiation-induced decrements in bone structure within four months post-IR with 100 cGy gamma and 12 months post-IR with 200 cGy iron. Transgenic mice globally overexpressing human catalase gene in mitochondria did not exhibit cancellous bone loss as assessed at four month post-IR with 10 cGy proton, 50 cGy iron, or in combination. (5) The cellular and molecular mechanisms responsible for loss of bone with radiation are mediated primarily through increased osteoclastogenesis. Our data provide evidence that there are increases in gene expression of TNF alpha and MCP1 in the bone marrow cells 24 hours post-IR and of osteoclastogenic differentiation factor RANKL by day 3. These cytokines in the marrow may stimulate mature osteoclasts or drive osteoclastogenesis from precursors. (6) Osteoblastogenesis from marrow progenitors evaluated ex vivo decreased following whole body 56Fe irradiation at a dose threshold between 20 and 50 cGy whereas osteoclastogenesis ex vivo increased with doses as low as 10cGy two days post-IR of mice. However, the latter finding was not observed in more than a single experiment. (7) Gamma irradiation of cells in vitro requires relatively high doses (200cGy) to disturb normal osteoblastogenesis and osteoclastogenesis as evidenced by decrements in mineralized nodule formation, osteoclast counts, and expression of osteoblast related genes such as runx2, col1a1. (8) We also investigated the effect of antioxidants on osteoblastogenesis following low dose in vitro gamma irradiation (15cGy) on day four bone marrow stromal cell cultures. Super

  1. Evaluation on the Feasibility of Using Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density/Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock

    SciTech Connect (OSTI)

    Sullivan, Edmund J.; Anderson, Michael T.

    2014-06-10

    This technical letter report provides the status of an assessment undertaken by PNNL at the request of the NRC to verify the capability of periodic ASME-required volumetric examinations of reactor vessels to characterize the density and distribution of flaws of interest for applying §50.61a on a plant-by-plant basis. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (§50.61), "Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events," establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. Recently, the NRC completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed and promulgated an alternate PTS rule, §50.61a, that can be implemented by PWR licensees. The §50.61a rule differs from §50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants.

  2. Real-time Molecular Study of Bystander Effects of Low dose Low LET radiation Using Living Cell Imaging and Nanoparticale Optics

    SciTech Connect (OSTI)

    Natarajan, Mohan; Xu, Nancy R; Mohan, Sumathy

    2013-06-03

    In this study two novel approaches are proposed to investigate precisely the low dose low LET radiation damage and its effect on bystander cells in real time. First, a flow shear model system, which would provide us a near in vivo situation where endothelial cells in the presence of extra cellular matrix experiencing continuous flow shear stress, will be used. Endothelial cells on matri-gel (simulated extra cellular matrix) will be subjected to physiological flow shear (that occurs in normal blood vessels). Second, a unique tool (Single nano particle/single live cell/single molecule microscopy and spectroscopy; Figure A) will be used to track the molecular trafficking by single live cell imaging. Single molecule chemical microscopy allows one to single out and study rare events that otherwise might be lost in assembled average measurement, and monitor many target single molecules simultaneously in real-time. Multi color single novel metal nanoparticle probes allow one to prepare multicolor probes (Figure B) to monitor many single components (events) simultaneously and perform multi-complex analysis in real-time. These nano-particles resist to photo bleaching and hence serve as probes for unlimited timeframe of analysis. Single live cell microscopy allows one to image many single cells simultaneously in real-time. With the combination of these unique tools, we will be able to study under near-physiological conditions the cellular and sub-cellular responses (even subtle changes at one molecule level) to low and very low doses of low LET radiation in real time (milli-second or nano-second) at sub-10 nanometer spatial resolution. This would allow us to precisely identify, at least in part, the molecular mediators that are responsible of radiation damage in the irradiated cells and the mediators that are responsible for initiating the signaling in the neighboring cells. Endothelial cells subjected to flow shear (2 dynes/cm2 or 16 dynes/cm2) and exposed to 0.1, 1 and 10 cGy on coverslips will be examined for (a) low LET radiation-induced alterations of cellular function and its physiological relevance in real time; and (b) radiation damage triggered bystander effect on the neighboring unirradiated cells. First, to determine the low LET radiation induced alteration of cellular function we will examine: (i) the real time transformation of single membrane transporters in single living cells; (ii) the pump efficiency of membrane efflux pump of live cells in real time at the molecular level; (iii) the kinetics of single-ligand receptor interaction on single live cell surface (Figure C); and (iv) alteration in chromosome replication in living cell. Second, to study the radiation triggered bystander responses, we will examine one of the key signaling pathway i.e. TNF- alpha/NF-kappa B mediated signaling. TNF-alpha specific nano particle sensors (green) will be developed to detect the releasing dynamics, transport mechanisms and ligand-receptor binding on live cell surface in real time. A second sensor (blue) will be developed to simultaneously monitor the track of NF-kB inside the cell. The proposed nano-particle optics approach would complement our DOE funded study on biochemical mechanisms of TNF-alpha- NF-kappa B-mediated bystander effect.

  3. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain ... AnyConnect VPN Client Two Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws ...

  4. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    26, 2013 V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges VMware Workstation and Player contain a vulnerability in the handling...

  5. V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python...

  6. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability...

  7. High temperature ultrasonic testing of materials for internal flaws

    DOE Patents [OSTI]

    Kupperman, David S. (Oak Park, IL); Linzer, Melvin (Silver Spring, MD)

    1990-01-01

    An apparatus is disclosed for nondestructive evaluation of defects in hot terials, such as metals and ceramics, by sonic signals, which includes a zirconia buffer in contact with a hot material being tested, a liquid couplant of borax in contact with the zirconia buffer and the hot material to be tested, a transmitter mounted on the zirconia buffer sending sonic signals through the buffer and couplant into the hot material, and a receiver mounted on the zirconia buffer receiving sonic signals reflected from within the hot material through the couplant and the buffer.

  8. Method and apparatus for detecting flaws in conductive material

    DOE Patents [OSTI]

    Hockey, R.L.; Riechers, D.M.

    1998-07-07

    The present invention uses a magnet in relative motion to a conductive material, and a coil that is stationary with respect to the magnet to measure perturbation or variation in the magnetic field in the presence of an inclusion. The magnet and coil sensor may be on the same side of the conductive material. 18 figs.

  9. U-245: Critical Java 0-day flaw exploited

    Broader source: Energy.gov [DOE]

    Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines

  10. Method and apparatus for detecting flaws in conductive material

    DOE Patents [OSTI]

    Hockey, Ronald L. (Richland, WA); Riechers, Douglas M. (Richland, WA)

    1998-01-01

    The present invention uses a magnet in relative motion to a conductive material, and a coil that is stationary with respect to the magnet to measure perturbation or variation in the magnetic field in the presence of an inclusion. The magnet and coil sensor may be on the same side of the conductive material.

  11. U-139: IBM Tivoli Directory Server Input Validation Flaw

    Broader source: Energy.gov [DOE]

    The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input.

  12. U-147:Red Hat Enterprise MRG Grid Input Validation Flaw

    Broader source: Energy.gov [DOE]

    The MRG Management Console (Cumin) does not properly filter HTML code from user-supplied input before displaying the input.

  13. Impedance sensing of flaws in non-homogenous materials

    DOE Patents [OSTI]

    Novak, James L.

    1997-01-01

    An apparatus and method for sensing impedances of materials placed in contact therewith. The invention comprises a plurality of drive electrodes and one or more sense electrodes. Both rotating electric fields and differently shaped electric fields are provided for, as are analysis of structure and composition at different orientations and depths.

  14. Impedance sensing of flaws in non-homogeneous materials

    DOE Patents [OSTI]

    Novak, J.L.

    1997-02-11

    An apparatus and method are disclosed for sensing impedances of materials placed in contact therewith. The invention comprises a plurality of drive electrodes and one or more sense electrodes. Both rotating electric fields and differently shaped electric fields are provided for, as are analysis of structure and composition at different orientations and depths. 10 figs.

  15. U-175: Linux Kernel KVM Memory Slot Management Flaw

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system.

  16. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  17. Let's Compare Tritium Design Practices Across The DOE Complex

    Office of Energy Efficiency and Renewable Energy (EERE)

    Presentation from the 32nd Tritium Focus Group Meeting held in Germantown, Maryland on April 23-25, 2013.

  18. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  19. V-098: Linux Kernel Extended Verification Module Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

  20. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  1. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  2. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    can be exploited to cause a crash via specially crafted packets. 6) An error in the MPEG DSM-CC dissector (dissectorspacket-mpeg-dsmcc.c) can be exploited to cause a crash via...

  3. Geothermal Literature Review | Open Energy Information

    Open Energy Info (EERE)

    Geothermal Literature Review (Smith, 1983) Unspecified A History Of Hot Dry Rock Geothermal Energy Systems Geothermal Literature Review (Wisian, Et Al., 2001) Unspecified...

  4. Distant Observer Tool Quickly Identifies Costly Flaws in CSP Fields (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-12-01

    Remote control digital photography and metrology are combined to accurately define optical efficiency problems in concentrating solar power (CSP) plants.

  5. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  6. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Symantec’s Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages.

  7. U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks

    Broader source: Energy.gov [DOE]

    The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

  8. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  9. U-255: Apache Wicket Input Validation Flaw Permits Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in ajax links before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed...

  10. Ultrasonic Phased Array Technique for Accurate Flaw Sizing in Dissimilar Metal Welds

    SciTech Connect (OSTI)

    Jonathan D Buttram

    2005-03-11

    Described is a manual,portable non-destructive technique to determine the through wall height of cracks present in dissimilar metal welds used in the primary coolling systems of pressure water and boiler light water reactors. Current manual methods found in industry have proven not to exhibit the sizing accuracy required by ASME inspection requirement. The technique described demonstrated an accuracy approximately three times that required to ASME Section XI, Appendix 8 qualification.

  11. Coiled tubing: Early warning system to detect flaws in flat sheet prior to rolling and welding

    SciTech Connect (OSTI)

    Edens, C.W. )

    1994-05-01

    Through experimentation and dynamic evaluation of skelp at a coiled tubing mill, the use of leakage flux solid state sensing devices shows clearly that the requirement for nondestructively testing skelp can be met. As coiled tubing for drilling purposes gains wider usage, its skelp can take advantage of upstream inspection prior to forming the tubes. A reliable coiled tubing product is one in which every aspect of its manufacturing was considered, from raw material through final inspection. In no other way can the concept of total quality management be satisfied providing reliability of product use. A guarantee of fitness for purpose falls directly on the coiled tubing manufacturer. Purveyors of jointed electronic resistance weld tubulars may also take advantage of this inspection method. The American Petroleum Institute (API) has recently established a committee to study and formulate recommended practices for coiled tubing operations.

  12. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  13. U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input.

  14. U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser.

  15. A STRUCTURAL IMPACT ASSESSMENT OF FLAWS DETECTED DURING ULTRASONIC EXAMINATION OF TANK 15

    SciTech Connect (OSTI)

    Wiersma, B; James Elder, J

    2008-08-21

    Ultrasonic (UT) inspection of Tank 15 was conducted between April and July 2007 in accordance with the Tank 15 UT inspection plan. This was a planned re-inspection of this tank, the previous one was performed in 2002. Ten cracks were characterized in the previous examination. The re-inspection was performed to verify the present models and understanding for stress corrosion cracking. During this re-examination, one indication that was initially reported as a 'possible perpendicular crack <25% through wall' in 2002, was clearly shown not to be a crack. Additionally, examination of a new area immediately adjacent to other cracks along a vertical weld revealed three new cracks. It is not known when these new cracks formed as they could very well have been present in 2002 as well. Therefore, a total of twelve cracks were evaluated during the re-examination. A critical review of the information describing stress corrosion crack behavior for the SRS waste tanks, as well as a summary review of the service history of Tank 15, was performed. Each crack was then evaluated for service exposure history, consistency of the crack behavior with the current understanding of stress corrosion cracking, and present and future impact to the structural integrity of the tank. Crack instability calculations were performed on each crack for a bounding waste removal loading condition in Tank 15. In all cases, the crack behavior was determined to be consistent with the previous understanding of stress corrosion cracking in the SRS waste tank environment. The length of the cracks was limited due to the short-range nature of the residual stresses near seam, repair and attachment welds. Of the twelve cracks, nine were located in the vapor space above the sludge layer, including the three new cracks. Comparison of the crack lengths measured in 2002 and 2007 revealed that crack growth had occurred in four of the six previously measured vapor space cracks. However, the growth remained within the residual stress zone. None of the three cracks beneath the sludge showed evidence of growth. The impact of the cracks that grew on the future service of Tank 15 was also assessed. Tank 15 is expected to undergo closure activities including sludge waste removal. A bounding loading condition for waste removal of the sludge at the bottom of Tank 15 was considered for this analysis. The analysis showed that the combination of hydrostatic, seismic, pump and weld residual stresses are not expected to drive any of the cracks identified during the Tank 15 UT inspection to instability. Wall thickness mapping for general thinning and pitting was also performed. No significant wall thinning was observed. The average wall thickness values were well above nominal. Two isolated pit-like indications were observed. Both were approximately 30 mils deep. However, the remaining wall thickness was still greater than nominal specified for the original construction plate material. It was recommended that a third examination of selected cracks in Tank 15 be performed in 2014. This examination would provide information to determine whether any additional detectable degradation is occurring in Tank 15 and to supplement the basis for characterization of conditions that are non-aggressive to tank corrosion damage. The in-service inspection program is re-evaluated on a three year periodicity. The Type I and II tanks are not active receipt tanks at present, and are therefore not a part of the In-Service Inspection Program for the Type III Tanks [1]. Changes to the mission for Tank 15 and other Type I and II tanks may be considered by the In-Service Inspection Review Committee (ISIRC) and the program adjusted accordingly.

  16. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks....

  17. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  18. T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input.

  19. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  20. U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  1. V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation.

  2. Geothermal Literature Review (Wisian, Et Al., 2001) | Open Energy...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Wisian, Et Al., 2001) Exploration Activity Details Location Unspecified...

  3. Geothermal Literature Review (Majer, 2003) | Open Energy Information

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Majer, 2003) Exploration Activity Details Location Unspecified Exploration...

  4. Geothermal Literature Review (Laney, 2005) | Open Energy Information

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Laney, 2005) Exploration Activity Details Location Unspecified Exploration...

  5. Geothermal Literature Review (Mcnitt, 1978) | Open Energy Information

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geothermal Literature Review (Mcnitt, 1978) Exploration Activity Details Location Unspecified Exploration...

  6. Magnetotellurics (Muse, 1973) | Open Energy Information

    Open Energy Info (EERE)

    (Muse, 1973) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Magnetotellurics (Muse, 1973) Exploration Activity Details Location Unspecified...

  7. Field Mapping (Healy, 1970) | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Field Mapping (Healy, 1970) Exploration Activity Details Location Unspecified Exploration Technique...

  8. Aerial Photography (Nannini, 1986) | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Aerial Photography (Nannini, 1986) Exploration Activity Details Location Unspecified Exploration...

  9. Geographic Information System (Nash, Et Al., 2002) | Open Energy...

    Open Energy Info (EERE)

    search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System (Nash, Et Al., 2002) Exploration Activity Details Location Unspecified Exploration...

  10. Water Sampling (Healy, 1970) | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Water Sampling (Healy, 1970) Exploration Activity Details Location Unspecified Exploration...

  11. Ground Magnetics (Nannini, 1986) | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Ground Magnetics (Nannini, 1986) Exploration Activity Details Location Unspecified Exploration...

  12. Modeling-Computer Simulations (Combs, Et Al., 1999) | Open Energy...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Modeling-Computer Simulations (Combs, Et Al., 1999) Exploration Activity Details Location Unspecified...

  13. Modeling-Computer Simulations (Ozkocak, 1985) | Open Energy Informatio...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Modeling-Computer Simulations (Ozkocak, 1985) Exploration Activity Details Location Unspecified...

  14. T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  15. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  16. T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain elevated privileges on the target system. A local user can trigger a use-after free or null pointer dereference to execute arbitrary commands on the target system with kernel level privileges.

  17. T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information

    Broader source: Energy.gov [DOE]

    A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space.

  18. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  19. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  20. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  1. Let us count the ways. We've built programs that reflect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We develop computational tools, algorithms and strategies to analyze, understand, create, design and build complex engineered, natural or human systems. Contact Mark Bryden,...

  2. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  3. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY...

  4. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  5. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  6. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  7. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  8. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  10. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  11. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    unavailable and may cause the domain 0 kernel to panic. There is no requirement for memory sharing to be in use. Impact: A guest kernel can cause the host to become unresponsive...

  12. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service

    Broader source: Energy.gov [DOE]

    A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor.

  13. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  14. T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker.

  15. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial...

  16. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  17. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local...

  18. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  19. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted AVI file that, when loaded by the target user, will trigger ...

  20. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  1. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  2. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  3. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  4. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  5. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  6. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  7. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  8. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  9. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can create a specially crafted file that, when loaded by the target user, will trigger a memory corruption error in WebKit and execute arbitrary code on the target ...

  10. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  11. Letting the Sun Shine on Solar Costs: An Empirical Investigation of Photovoltaic Cost Trends in California

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.; Cappers, P.; Margolis, R.

    2006-01-01

    This report provides a comprehensive analysis of grid-connected solar photovoltaic (PV) cost trends in California, which is by far the largest PV market in the United States. The findings of this work may help stakeholders to understand important trends in the California PV market, and policymakers to design more effective solar incentive programs--a particularly important objective given the recent announcement from the California Public Utilities Commission (CPUC) to establish an 11-year, $3.2 billion incentive program for customer-sited solar. The study statistically analyzes the installed cost of grid-connected PV systems funded by the state's two largest solar rebate programs, overseen by the California Energy Commission (CEC) [operating since 1998] and the CPUC [operating since 2001].

  12. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289...

  13. U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information.

  14. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Kdump uses the SSH "StrictHostKeyCheckingno" option when dumping to SSH targets. A remote user on the local network with the ability to conduct a man-in-the-middle attack can ...

  15. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS ... A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS ...

  16. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  17. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  18. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  19. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  20. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  1. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  2. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    or instant messages. BlackBerry has described a workaround (disabling the use of JavaScript in the BlackBerry Browser) in their advisory. BlackBerry Device storage space...

  3. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  4. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  5. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  6. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  7. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  8. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  9. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers

    Broader source: Energy.gov [DOE]

    A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

  10. Turn Down the Temp, But Don't Let Your Pipes Freeze! | Department...

    Energy Savers [EERE]

    But she can't be the only person out there who thought of this, so I'd like to remind you all out there: Please, save energy Saving energy is good. But please, please think of ...

  11. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... of Cisco's software license terms found at http:www.cisco.comenUSdocsgeneralwarrantyEnglishEU1KEN.html, or as otherwise set forth at Cisco.com Downloads at http:...

  12. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  13. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    recommends applying July Critical Patch Update Addthis Related Articles V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-051: Oracle Solaris Java Multiple...

  14. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Broader source: Energy.gov [DOE]

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  15. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  16. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations.

  17. BLM and NEPA: Lets`s get back to the future

    SciTech Connect (OSTI)

    Meridith, D.P.

    1995-12-01

    This talk is a personalized account of the relationship between The National Environmental Policy Act (NEPA) and the Bureau of Land Management (BLM) and the challenges the BLM faces in the future.

  18. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  19. Distant Observer Tool Quickly Identifies Costly Flaws in CSP Fields (Fact Sheet), Highlights in Research & Development, NREL (National Renewable Energy Laboratory)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    control digital photography and metrology are combined to accurately define optical efficiency problems in concentrating solar power (CSP) plants. In a typical 100-megawatt (MW) CSP plant, an optical efficiency gain or loss of a mere 1% is worth about $600,000 in annual revenue. Hence, optimizing optical efficiency is key to the plant's economic viability. The Distant Observer (DO) tool, developed by the National Renewable Energy Laboratory (NREL), quickly and accurately measures the efficiency

  20. T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The BlackBerry Web Desktop Manager not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the BlackBerry Web Desktop Manager software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  1. T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges.

  2. From ZZ to ZH : How Low Can These Cross Sections Go or Everybody, Let's Cross Section Limbo!

    SciTech Connect (OSTI)

    Strauss, Emanuel Alexandre; /SUNY, Stony Brook

    2009-08-01

    We report on two searches performed at the D0 detector at the Fermi National Laboratory. The first is a search for Z di-boson production with a theoretical cross section of 1.4 pb. The search was performed on 2.6 fb{sup -1} of data and contributed to the first observation of ZZ production at a hadron collider. The second is a search for a low mass Standard Model Higgs in 4.2 fb{sup -1} of data. The Higgs boson is produced in association with a Z boson where the Higgs decays hadronically and the Z decays to two leptons. The ZZ search was performed in both the di-electron and di-muon channels. For the ZH search, we will focus on the muonic decays where we expanded the traditional coverage by considering events in which one of the two muons fails the selection requirement, and is instead reconstructed as an isolated track. We consider Higgs masses between 100 and 150 GeV, with theoretical cross sections ranging from 0.17 to 0.042 pb, and set upper limits on the ZH production cross-section at 95% confidence level.

  3. U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in VMware ESX. A local user can obtain elevated privileges on the target system.

  4. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  5. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  6. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host.

  7. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  8. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  9. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  10. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  11. V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services

  12. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  13. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  14. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  15. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  16. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  17. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  19. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  20. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  1. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  2. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  3. BrightView Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Ltd Jump to: navigation, search Name: BrightView Systems Ltd Place: Petach-Tikva, Israel Zip: 49510 Product: Has developed an unspecified technology for PV cell manufacture....

  4. T-722: IBM WebSphere Commerce Edition Input Validation Holes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    with unspecified impact CVE-2010-2276. The vulnerabilities reside in the included 'Dojo' component. Impact: A remote user can access the target user's cookies (including ...

  5. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Configuration and Execute Arbitrary Code T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability T-725: Cisco Unified Service Monitor and Cisco Unified ...

  6. Thermochronometry (Monaster And Coolbaugh, 2007) | Open Energy...

    Open Energy Info (EERE)

    Location Unspecified Exploration Technique Thermochronometry Activity Date Usefulness useful DOE-funding Unknown References Francis C. Monastero, Mark F. Coolbaugh (2007) Advances...

  7. InSAR (Monaster And Coolbaugh, 2007) | Open Energy Information

    Open Energy Info (EERE)

    Details Location Unspecified Exploration Technique InSAR Activity Date Usefulness useful DOE-funding Unknown References Francis C. Monastero, Mark F. Coolbaugh (2007) Advances...

  8. Multispectral Imaging (Monaster And Coolbaugh, 2007) | Open Energy...

    Open Energy Info (EERE)

    Unspecified Exploration Technique Multispectral Imaging Activity Date Usefulness useful DOE-funding Unknown References Francis C. Monastero, Mark F. Coolbaugh (2007) Advances...

  9. Some Aspects Of Exploration In Non-Volcanic Areas | Open Energy...

    Open Energy Info (EERE)

    Aeromagnetic Survey (Nannini, 1986) Ground Gravity Survey (Nannini, 1986) Ground Magnetics (Nannini, 1986) Reflection Survey (Nannini, 1986) Areas (1) Unspecified Regions (0)...

  10. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  11. BPA-2013-01583-FOIA Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Headquarters Misuse of Resources Misuse or C The Caller reported unspecified time card fraud New 50 Misappropriation of Assets or Information 09172012 BPA-12-09-0006 Raver...

  12. InSAR | Open Energy Information

    Open Energy Info (EERE)

    2007) Unspecified Advances In Geothermal Resource Exploration Circa 2007 InSAR At Brady Hot Springs Area (Laney, 2005) Brady Hot Springs Area Federal Geothermal Research...

  13. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site...

  14. Sandia Energy Infrastructure Assurance

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind-Turbine Blade Flaw Detection Experiments in Denmark http:energy.sandia.govsandia-wind-turbine-blade-flaw-detection-experiments-in-denmark http:energy.sandia.gov...

  15. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  16. Health effects models for nuclear power plant accident consequence analysis: Low LET radiation: Part 2, Scientific bases for health effects models

    SciTech Connect (OSTI)

    Abrahamson, S.; Bender, M.; Book, S.; Buncher, C.; Denniston, C.; Gilbert, E.; Hahn, F.; Hertzberg, V.; Maxon, H.; Scott, B.

    1989-05-01

    This report provides dose-response models intended to be used in estimating the radiological health effects of nuclear power plant accidents. Models of early and continuing effects, cancers and thyroid nodules, and genetic effects are provided. Two-parameter Weibull hazard functions are recommended for estimating the risks of early and continuing health effects. Three potentially lethal early effects -- the hematopoietic, pulmonary and gastrointestinal syndromes -- are considered. Linear and linear-quadratic models are recommended for estimating cancer risks. Parameters are given for analyzing the risks of seven types of cancer in adults -- leukemia, bone, lung, breast, gastrointestinal, thyroid and ''other''. The category, ''other'' cancers, is intended to reflect the combined risks of multiple myeloma, lymphoma, and cancers of the bladder, kidney, brain, ovary, uterus and cervix. Models of childhood cancers due to in utero exposure are also provided. For most cancers, both incidence and mortality are addressed. Linear and linear-quadratic models are also recommended for assessing genetic risks. Five classes of genetic disease -- dominant, x-linked, aneuploidy, unbalanced translocation and multifactorial diseases --are considered. In addition, the impact of radiation-induced genetic damage on the incidence of peri-implantation embryo losses is discussed. The uncertainty in modeling radiological health risks is addressed by providing central, upper, and lower estimates of all model parameters. Data are provided which should enable analysts to consider the timing and severity of each type of health risk. 22 refs., 14 figs., 51 tabs.

  17. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  18. 'Let the phage do the work': Using the phage P22 coat protein structures as a framework to understand its folding and assembly mutants

    SciTech Connect (OSTI)

    Teschke, Carolyn M., E-mail: Teschke@uconn.ed [Departments of Molecular and Cell Biology, and Chemistry, 91 N. Eagleville Rd., U-3125, University of Connecticut, Storrs, CT 06269-3125 (United States); Parent, Kristin N. [Department of Chemistry and Biochemistry, University of California, San Diego, La Jolla, CA (United States)

    2010-06-05

    The amino acid sequence of viral capsid proteins contains information about their folding, structure and self-assembly processes. While some viruses assemble from small preformed oligomers of coat proteins, other viruses such as phage P22 and herpesvirus assemble from monomeric proteins (Fuller and King, 1980). The subunit assembly process is strictly controlled through protein:protein interactions such that icosahedral structures are formed with specific symmetries, rather than aberrant structures. dsDNA viruses commonly assemble by first forming a precursor capsid that serves as a DNA packaging machine. DNA packaging is accompanied by a conformational transition of the small precursor procapsid into a larger capsid for isometric viruses. Here we highlight the pseudo-atomic structures of phage P22 coat protein and rationalize several decades of data about P22 coat protein folding, assembly and maturation generated from a combination of genetics and biochemistry.

  19. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  20. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  1. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions.

  2. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods...

  3. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    11, 2013 V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods...

  4. All Beams 2013.xls

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mass (amu) A MeV Total Energy (MeV) Energy at Bragg Peak (MeV) Range in Si (m) Range at Bragg (m) Range to Bragg Peak (m) Initial LET (vacuum) Initial LET (air) LET at...

  5. Useful Graphs and Charts - Ion Beams - Radiation Effects Facility...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Times 15 MeVu LET vs Range Graph 25 MeVu LET vs Range Graph 40 Mevu LET vs Range Graph Radiation Effects Facility Cyclotron Institute Texas A&M University MS 3366 ...

  6. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users ... Lets Remote Users Obtain Database Contents V-076: Cisco Wireless LAN Controller Bugs Let ...

  7. V-117: Symantec Enterprise Vault for File System Archiving Unquoted...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local...

  8. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  9. fe0024293-geglobal | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Operators will be able to remedy well integrity flaws with the nXis inspection system, which will be capable of providing enhanced information about the flaw structure and...

  10. T-610: Red Hat kdenetwork security update

    Broader source: Energy.gov [DOE]

    A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files.

  11. FEAB210 | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Pipeline Flaw Detection Using Shear EMAT and Wavelet Analysis FEAB210 Goal: The goal of this project is to develop an Electromagnetic Acoustic Transducer (EMAT) sensor, capable of detecting physical flaws in the wall of a 30-inch natural gas pipeline. These physical flaws include: stress corrosion cracking (SCC), circumferential and axial flaws, and corrosion. In addition, work will be conducted to design, fabricate, test, and integrate the EMAT sensor with an autonomous robotic platform,

  12. T-632: Google Chrome OS before R12 0.12.433.38 Beta Update

    Broader source: Energy.gov [DOE]

    CVE-2011-2171 addresses unspecified vulnerabilities in the dbugs package of Google Chrome OS. Prior versions of Google Chrome can be fixed by updating to the current release. Information and content related to this CVE was last updated on 05/25/2011. To find out more information about Chromium OS Security and Reported Bugs, please visit: The Chromium Projects Security Overview.

  13. T-611: Cisco IOS OCSP Revoked Certificate Security Issue

    Broader source: Energy.gov [DOE]

    The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug ID CSCth82164, a different vulnerability than CVE-2010-4685.

  14. Sandia Energy Monitoring

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    rspace-warning-area-established-to-aid-research-explorationfeed 0 Sandia Wind-Turbine Blade Flaw Detection Experiments in Denmark http:energy.sandia.govsandia-wind-turbine-bla...

  15. Image Analysis of Turbine Blades Using CT Scans| GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    exceptional potential but are hidden and undetected. These flaws can occur during the manufacturing processes of turbine blades in a jet or gas engine. If large enough, they...

  16. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  17. Low frequency acoustic microscope

    DOE Patents [OSTI]

    Khuri-Yakub, Butrus T. (Palo Alto, CA)

    1986-11-04

    A scanning acoustic microscope is disclosed for the detection and location of near surface flaws, inclusions or voids in a solid sample material. A focused beam of acoustic energy is directed at the sample with its focal plane at the subsurface flaw, inclusion or void location. The sample is scanned with the beam. Detected acoustic energy specularly reflected and mode converted at the surface of the sample and acoustic energy reflected by subsurface flaws, inclusions or voids at the focal plane are used for generating an interference signal which is processed and forms a signal indicative of the subsurface flaws, inclusions or voids.

  18. T-701: Citrix Access Gateway Enterprise Edition Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks T-701: Citrix Access Gateway Enterprise Edition Input...

  19. Beyond the Lone-Pair Model for Structurally Distorted Metal Oxides

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The results have important implications for the tantalizing possibility of spintronic or superconducting devices combining ferroelectric and ferromagnetic properties. Flawed but ...

  20. Sandia Energy - Wind-Turbine Blade Materials and Reliability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the technology to be evaluated in terms of its probability of detection (POD). Different types and sizes of flaws were embedded into substructure components representing...

  1. T-559: Stack-based buffer overflow in oninit in IBM Informix...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    exploit this vulnerability. The specific flaw exists within the oninit process bound to TCP port 9088 when processing the arguments to the USELASTCOMMITTED option in a SQL query....

  2. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local ... Scripting and URL Redirection Attacks V-151: RSA Archer eGRC Bugs Let Remote ...

  3. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute ... Lets Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid ...

  4. INDUSTRIAL ASSESSMENT CENTERS: IAC Quarterly Update

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... With a site audit, we can truly set our brain free; let it run amok with ideas for ... got a trusty pair of khakis, boots, and a willingness to let your brain run free on site. ...

  5. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  6. QER- Comment of Xcel Energy

    Broader source: Energy.gov [DOE]

    Attached are the comments of Xcel Energy Services Inc. Please let me know if you have any questions.

  7. Emissivity corrected infrared method for imaging anomalous structural heat flows

    DOE Patents [OSTI]

    Del Grande, Nancy K.; Durbin, Philip F.; Dolan, Kenneth W.; Perkins, Dwight E.

    1995-01-01

    A method for detecting flaws in structures using dual band infrared radiation. Heat is applied to the structure being evaluated. The structure is scanned for two different wavelengths and data obtained in the form of images. Images are used to remove clutter to form a corrected image. The existence and nature of a flaw is determined by investigating a variety of features.

  8. Risk assessment of turbine rotor failure using probabilistic ultrasonic non-destructive evaluations

    SciTech Connect (OSTI)

    Guan, Xuefei; Zhang, Jingdan; Zhou, S. Kevin; Rasselkorde, El Mahjoub; Abbasi, Waheed A.

    2014-02-18

    The study presents a method and application of risk assessment methodology for turbine rotor fatigue failure using probabilistic ultrasonic nondestructive evaluations. A rigorous probabilistic modeling for ultrasonic flaw sizing is developed by incorporating the model-assisted probability of detection, and the probability density function (PDF) of the actual flaw size is derived. Two general scenarios, namely the ultrasonic inspection with an identified flaw indication and the ultrasonic inspection without flaw indication, are considered in the derivation. To perform estimations for fatigue reliability and remaining useful life, uncertainties from ultrasonic flaw sizing and fatigue model parameters are systematically included and quantified. The model parameter PDF is estimated using Bayesian parameter estimation and actual fatigue testing data. The overall method is demonstrated using a realistic application of steam turbine rotor, and the risk analysis under given safety criteria is provided to support maintenance planning.

  9. STATE OF WASHINGTON August

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    STATE OF WASHINGTON August 29, 2012 The Honorable Stephen Chu, Secretary United States Department of Energy 1000 Independence Avenue Washington, DC 20585 Dear Secretary Chu: As you know, we reached a significant agreement on the parameters for Hanford cleanup in a Consent Decree signed in federal court in October 2010. In November 2011,just 13 months later, DOE informed us that a number of unspecified Consent Decree requirements were at risk. Nearly six more months passed before DOE provided the

  10. Observations on Characterization of Defects in Coiled Tubing From Magnetic-Flux-Leakage Data

    SciTech Connect (OSTI)

    Timothy R. McJunkin; Karen S. Miller; Charles R. Tolle

    2006-04-01

    This paper presents observations on the sizing of automatically detected artificial flaws in coiled tubing samples using magnetic-flux-leakage data. Sixty-six artificial flaws of various shapes and types, ranging from 0.30 mm deep pits to slots with length of 9.5 mm, in 44.45 mm outer diameter pipe were analyzed. The detection algorithm and the information automatically extracted from the data are described. Observations on the capabilities and limitations for determining the size and shape of the flaws are discussed.

  11. PARALLELS OF RADIATION- AND FINANCIAL-RISK MANAGEMENT ON PUBLIC ACCEPTANCE

    SciTech Connect (OSTI)

    Hogue, M.

    2010-01-04

    The financial collapse of 2007 provides an opportunity for a cross-discipline comparison of risk assessments. Flaws in financial risk assessments bear part of the blame for the financial collapse. There may be a potential for similar flaws to be made in radiological risk assessments. Risk assessments in finance and health physics are discussed in the context of a broader view of the risk management environment. Flawed risk assessments can adversely influence public acceptance of radiological technologies, so the importance of quality is magnified.

  12. Science Careers in Search of Women | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    now, and let us make our dreams tomorrow's reality." -Malala Yousafzai, 2014 Nobel Peace Prize Laurate Argonne Education, in conjunction with Women in Science and Technology,...

  13. U-267: RSA Authentication Agent 7.1 for Microsoft Windows...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  14. "Title","Creator/Author","Publication Date","OSTI Identifier...

    Office of Scientific and Technical Information (OSTI)

    Genome Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September...

  15. Genome Wide Evaluation of Normal Human Tissue in Response to...

    Office of Scientific and Technical Information (OSTI)

    Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September 2013 Rocke,...

  16. V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2044373) Addthis Related Articles U-128: VMware ESXESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges T-552: Cisco Nexus 1000V...

  17. DOE MENTOR-PROTÉGÉ

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... agreement including a schedule of mentoring activities. 3. Mentor andor Protg ... Upon approval from the OSDBU, let the Mentoring begin... WHERE ARE THE OPPORTUNITIES? Site ...

  18. EPA Launches 2014 National Building Competition

    Broader source: Energy.gov [DOE]

    Let the battle begin! The U.S. Environmental Protection Agency (EPA) in mid-July launched the 2014 National Building Competition.

  19. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  20. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  1. USASpending.gov to STARS Reconciliation Initiative (and Procurement...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a visual catalog to help you find the right report - Trainedmentored field reporting ... keeping your site informed * Speak up - Let us know about your problems & concerns ... ...

  2. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service ... Adapters Interface Processor Vulnerability V-135: Cisco ASA Multiple Bugs Let Remote ...

  3. Pueblo of Laguna Utility Authority

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TRIBAL UTILITY KAWAIKA HANU INTERNET LET US GET YOU CONNECTED Kawaika Hanu is your local internet service provider offering high speed internet with competitive rates. ...

  4. Energy Efficiency Post-2011 Review Scoping Document and Process...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    workgroups, please let BPA know in your submitted comments. I. Overview and Timeline The "Energy Efficiency Post-2011 Review" (Review) is a public process to review and consider...

  5. ALSNews Vol. 327

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Beamlines ALS in the News: Keep Up with Our News Releases, and Let Us Keep Up with Yours Winter 2012 Shutdown Update Ring Leaders: Director's Address Announcements: Science...

  6. Be a Safe and Efficient Winter Driver

    Broader source: Energy.gov [DOE]

    We've been advising you on ways to make the home more energy smart, so let's talk about your car for a moment.

  7. Fermilab F

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    please let us know. Sincerely, Michael Witherell Attachment cc: K. Stanfield H. Montgomery S. Holmes J. Appel Excerpt from April 2004 PAC Recommendations P-938 MINERA...

  8. Voluntary Initiative: Designing Incentives Toolkit | Department...

    Office of Environmental Management (EM)

    & Publications Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Better Buildings Network View | March 2015 Spotlight on Austin, Texas: Best...

  9. QER- Comment of National Rural Electric Cooperative Association 4

    Broader source: Energy.gov [DOE]

    NRECA is submitting additional comments to supplement the one previously filed on October 3rd. Please let me know if you have any questions.

  10. How to Apply

    Broader source: Energy.gov [DOE]

    Awards are made through a formal process that has changed dramatically since 2011. So let us walk you through it step by step.

  11. U.S. Department of Energy Interim E-QIP Procedures | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Energy Security Symposium OE Releases Second Issue of Energy Emergency Preparedness Quarterly (April 2012) V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets...

  12. Celebrating and supporting women

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Workshop titles ranged from "Computational Thinking" and "Crystal Craziness" to "Sports Nutrition" and "Ocean Density, Currents and Ice." In the "Let's go to the River ...

  13. Roberson Letter - June 2, 2003

    Office of Environmental Management (EM)

    Advisory Boards (SSABs). Let me extend my appreciation for the time and effort put forth by the SSABs in developing a comprehensive set of recommendations to accelerate...

  14. Fiona Ginty | Inventors | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a new biomarker technology platform against multiple cancers. The Road Taken Culture, art, food and work have all let Fiona travel the world. And she's taken critical lessons...

  15. Apartment Hunting with an Eye to Energy Savings: Part I

    Broader source: Energy.gov [DOE]

    Apartment hunting can be a long and stressful process. Finding that right place is difficult, let alone finding the right place with the right price.

  16. Web Feedback & Questions - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Web Feedback & Questions Web Feedback & Questions Web Feedback & Questions Email Email Page | Print Print Page |Text Increase Font Size Decrease Font Size Please let us know if you ...

  17. SAND2012-2218P

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... renewable energy sources, grid-scale energy storage, distributed generation and demand response applications that let consumers adjust energy use based on changing energy ...

  18. So What Are We Going to Learn?

    Office of Environmental Management (EM)

    Theseus Professional Services, LLC Results Through Service Excellence Slide 4 CODE COMPUTER PROGRAM SOFTWARE Let Agree on Terms Software Used in the Nuclear Industry Results...

  19. Ion Beams - Radiation Effects Facility / Cyclotron Institute...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Useful Graphs Various ion beams have been developed specifically for the Radiation Effects Facility. These beams provide for a wide scope of LET with high energies for...

  20. Summer in the Arctic | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    ... And let's not forget about summer in the Antarctic, which happens during our winter months. Closely related to NGEE, the Atmospheric Radiation Measurement External link (ARM) ...

  1. Aligned composite structures for mitigation of impact damage and resistance to wear in dynamic environments

    DOE Patents [OSTI]

    Mulligan, Anthony C.; Rigali, Mark J.; Sutaria, Manish P.; Popovich, Dragan; Halloran, Joseph P.; Fulcher, Michael L.; Cook, Randy C.

    2005-12-13

    Fibrous monolith composites having architectures that provide increased flaw insensitivity, improved hardness, wear resistance and damage tolerance and methods of manufacture thereof are provided for use in dynamic environments to mitigate impact damage and increase wear resistance.

  2. Aligned composite structures for mitigation of impact damage and resistance to wear in dynamic environments

    DOE Patents [OSTI]

    Rigali, Mark J.; Sutaria, Manish P.; Mulligan, Anthony C.; Popovich, Dragan

    2004-03-23

    Fibrous monolith composites having architectures that provide increased flaw insensitivity, improved hardness, wear resistance and damage tolerance and methods of manufacture thereof are provided for use in dynamic environments to mitigate impact damage and increase wear resistance.

  3. U.S. DEPARTMENT OF ENERGY * SAVANNAH RIVER SITE * AIKEN * SC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    assessment Reduction in inspection time and cost Increased safety and reliability Non-invasive test method Detects and locates detrimental flaws U.S. patent 6,311,565 Savannah...

  4. Aligned composite structures for mitigation of impact damage and resistance to wear in dynamic environments

    DOE Patents [OSTI]

    Mulligan, Anthony C. (Tucson, AZ); Rigali, Mark J. (Tucson, AZ); Sutaria, Manish P. (Malden, MA); Popovich, Dragan (Redmond, WA); Halloran, Joseph P. (Tucson, AZ); Fulcher, Michael L. (Tucson, AZ); Cook, Randy C. (Tucson, AZ)

    2009-04-14

    Fibrous monolith composites having architectures that provide increased flaw insensitivity, improved hardness, wear resistance and damage tolerance and methods of manufacture thereof are provided for use in dynamic environments to mitigate impact damage and increase wear resistance.

  5. BPA-2015-01296-FOIA Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    It is from the Aprill4, 2015letter from DW Gregoire of Energy Northwest to the NRC with subject: COLUMBIA GENERATING STATION, DOCKET NO. 50-397 DEVIATION FROM BWRVIP FLAW...

  6. Answering Mom: What Is Cloud Computing? | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    flaws to this model - it is incomplete, exaggerates some aspects, and clothes are not digital (yet) so cannot be replicated or transmitted (like a virtual closet). But as a...

  7. Search for: All records | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    ... CMBs smaller than 10 pm and greater than 50 pm were markedly ellipsoidal and about one third of the CMBs exhibited 'sequential' cracking, revealing the existence of flaws. SEM and ...

  8. Emissivity corrected infrared method for imaging anomalous structural heat flows

    DOE Patents [OSTI]

    Del Grande, N.K.; Durbin, P.F.; Dolan, K.W.; Perkins, D.E.

    1995-08-22

    A method for detecting flaws in structures using dual band infrared radiation is disclosed. Heat is applied to the structure being evaluated. The structure is scanned for two different wavelengths and data obtained in the form of images. Images are used to remove clutter to form a corrected image. The existence and nature of a flaw is determined by investigating a variety of features. 1 fig.

  9. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  10. Nondestructive ultrasonic testing of materials

    DOE Patents [OSTI]

    Hildebrand, Bernard P. (Richland, WA)

    1994-01-01

    Reflection wave forms obtained from aged and unaged material samples can be compared in order to indicate trends toward age-related flaws. Statistical comparison of a large number of data points from such wave forms can indicate changes in the microstructure of the material due to aging. The process is useful for predicting when flaws may occur in structural elements of high risk structures such as nuclear power plants, airplanes, and bridges.

  11. Nondestructive ultrasonic testing of materials

    DOE Patents [OSTI]

    Hildebrand, B.P.

    1994-08-02

    Reflection wave forms obtained from aged and unaged material samples can be compared in order to indicate trends toward age-related flaws. Statistical comparison of a large number of data points from such wave forms can indicate changes in the microstructure of the material due to aging. The process is useful for predicting when flaws may occur in structural elements of high risk structures such as nuclear power plants, airplanes, and bridges. 4 figs.

  12. RangeTables.xls

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (MeVcmmg) LET vs. Range in Si for 25 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 600 1200 1800 2400 3000 3600 4 He 14 N 22 Ne 0 1 2 3 4 5 6 7 8 9 10 0 100 200 300 400 500...

  13. RangeTables.xlsx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vcmmg) LET vs. Range in Si for 15 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 200 400 600 800 1000 1200 1400 Range in Silicon (m) 4 He 14 N 20 Ne 0 1 2 3 4 5 0 50 100 150...

  14. ORNL Evaluation of Electrabel Safety Cases for Doel 3 / Tihange 2: Final Report

    SciTech Connect (OSTI)

    Bass, Bennett Richard; Dickson, Terry L.; Gorti, Sarma B.; Klasky, Hilda B.; Nanstad, Randy K.; Sokolov, Mikhail A.; Williams, Paul T.; Server, W. L.

    2015-11-01

    Oak Ridge National Laboratory (ORNL) performed a detailed technical review of the 2015 Electrabel (EBL) Safety Cases prepared for the Belgium reactor pressure vessels (RPVs) at Doel 3 and Tihange 2 (D3/T2). The Federal Agency for Nuclear Control (FANC) in Belgium commissioned ORNL to provide a thorough assessment of the existing safety margins against cracking of the RPVs due to the presence of almost laminar flaws found in each RPV. Initial efforts focused on surveying relevant literature that provided necessary background knowledge on the issues related to the quasilaminar flaws observed in D3/T2 reactors. Next, ORNL proceeded to develop an independent quantitative assessment of the entire flaw population in the two Belgian reactors according to the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code, Section XI, Appendix G, Fracture Toughness Criteria for Protection Against Failure, New York (1992 and 2004). That screening assessment of all EBL-characterized flaws in D3/T2 used ORNL tools, methodologies, and the ASME Code Case N-848, Alternative Characterization Rules for QuasiLaminar Flaws . Results and conclusions from the ORNL flaw acceptance assessments of D3/T2 were compared with those from the 2015 EBL Safety Cases. Specific findings of the ORNL evaluation of that part of the EBL structural integrity assessment focusing on stability of the flaw population subjected to primary design transients include the following: ORNL s analysis results were similar to those of EBL in that very few characterized flaws were found not compliant with the ASME (1992) acceptance criterion. ORNL s application of the more recent ASME Section XI (2004) produced only four noncompliant flaws, all due to LOCAs. The finding of a greater number of non-compliant flaws in the EBL screening assessment is due principally to a significantly more restrictive (conservative) criterion for flaw size acceptance used by EBL. ORNL s screening assessment results (obtained using an analysis methodology different from that of EBL) are interpreted herein as confirming the EBL screening results for D3/T2. ORNL s independent refined analysis demonstrated the EBL-characterized flaw 1660, which is non-compliant in the ORNL and EBL screening assessment, is rendered compliant when modeled as a more realistic individual quasi-laminar flaw using a 3-D XFEM analysis approach. ORNL s and EBL s refined analyses are in good agreement for the flaw 1660 close to the clad/base metal interface; ORNL is not persuaded that repeating this exercise for more than one non-compliant flaw is necessary to accept the EBL conclusions derived from the aggregate of EBL refined analysis results. ORNL General Conclusions Regarding the Structural Integrity Assessment (SIA) Conducted by EBL for D3/T2 Based on comparative evaluations of ORNL and EBL SIA analyses and on consideration of other results, ORNL is in agreement with the general conclusions reported by Electrabel in their RPV D3/T2 Technical Summary Note of April 14, 2015: More than 99 percent of flaws in D3/T2 meet the defined screening criterion, rendering them benign with respect to initiation in the event of a design transient. Refined analyses of non-compliant flaws from the screening assessment indicate that only 11 of the 16196 detected flaws have a critical reference-temperature material index (designated RTNDT) that implies the possibility of the initiation of cleavage fracture at some future time. For those 11 2 flaws, the calculated margin in RTNDT (a measure of acceptable embrittlement relative to end-ofservice-life conditions) is significant, being greater than 80 C. Fatigue crack growth is not a concern in the flaw-acceptability analyses. Primary stress re-evaluation confirms that the collapse pressure is more than 1.5 times the design pressure in the presence of defects detected in D3/T2. Sufficient conservatisms are built into the input data and into the different steps of the SIA; in some cases, those conservatisms are quantified and imply that additional margins exist in the SIA. Taken as a whole, the foregoing results and conclusions confirm the structural integrity of Doel 3 and Tihange 2 under all design transients with ample margin in the presence of the 16196 detected flaws.

  15. Controlled quantum-state transfer in a spin chain

    SciTech Connect (OSTI)

    Gong, Jiangbin [Department of Physics and Center for Computational Science and Engineering, National University of Singapore, 117542 (Singapore); Brumer, Paul [Chemical Physics Theory Group and Center for Quantum Information and Quantum Control, University of Toronto, Toronto M5S 3H6 (Canada)

    2007-03-15

    Control of the transfer of quantum information encoded in quantum wave packets moving along a spin chain is demonstrated. Specifically, based on a relationship with control in a paradigm of quantum chaos, it is shown that wave packets with slow dispersion can automatically emerge from a class of initial superposition states involving only a few spins, and that arbitrary unspecified traveling wave packets can be nondestructively stopped and later relaunched with perfection. The results establish an interesting application of quantum chaos studies in quantum information science.

  16. Inquiring Minds - Questions About Physics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Getting particles for the accelerator Hi I am 11 and my name is Joshua Pevitz. When I grow up I want to work at Fermilab. I was wondering if you could explain to me about how you let only one atom in the accelerator, if everything is made out of atoms? Your admirer, Joshua Pevitz Dear Joshua, Thanks for your interesting question! Let me give you the simple answer first, and then I will explain. We do not let only one atom at a time into the accelerator. Instead we have more than 10 trillion

  17. System for measuring temporal profiles of scintillation at high and different linear energy transfers by using pulsed ion beams

    SciTech Connect (OSTI)

    Koshimizu, Masanori Asai, Keisuke; Kurashima, Satoshi; Taguchi, Mitsumasa; Kimura, Atsushi; Iwamatsu, Kazuhiro

    2015-01-15

    We have developed a system for measuring the temporal profiles of scintillation at high linear energy transfer (LET) by using pulsed ion beams from a cyclotron. The half width at half maximum time resolution was estimated to be 1.52.2 ns, which we attributed mainly to the duration of the pulsed ion beam and timing jitter between the trigger signal and the arrival of the ion pulse. The temporal profiles of scintillation of BaF{sub 2} at different LETs were successfully observed. These results indicate that the proposed system is a powerful tool for analyzing the LET effects in temporal profiles of scintillation.

  18. Single crystal metal wedges for surface acoustic wave propagation

    DOE Patents [OSTI]

    Fisher, E.S.

    1980-05-09

    An ultrasonic testing device has been developed to evaluate flaws and inhomogeneities in the near-surface region of a test material. A metal single crystal wedge is used to generate high frequency Rayleigh surface waves in the test material surface by conversion of a slow velocity, bulk acoustic mode in the wedge into a Rayleigh wave at the metal-wedge test material interface. Particular classes of metals have been found to provide the bulk acoustic modes necessary for production of a surface wave with extremely high frequency and angular collimation. The high frequency allows flaws and inhomogeneities to be examined with greater resolution. The high degree of angular collimation for the outgoing ultrasonic beam permits precision angular location of flaws and inhomogeneities in the test material surface.

  19. Single crystal metal wedges for surface acoustic wave propagation

    DOE Patents [OSTI]

    Fisher, Edward S. (Wheaton, IL)

    1982-01-01

    An ultrasonic testing device has been developed to evaluate flaws and inhomogeneities in the near-surface region of a test material. A metal single crystal wedge is used to generate high frequency Rayleigh surface waves in the test material surface by conversion of a slow velocity, bulk acoustic mode in the wedge into a Rayleigh wave at the metal-wedge test material interface. Particular classes of metals have been found to provide the bulk acoustic modes necessary for production of a surface wave with extremely high frequency and angular collimation. The high frequency allows flaws and inhomogeneities to be examined with greater resolution. The high degree of angular collimation for the outgoing ultrasonic beam permits precision angular location of flaws and inhomogeneities in the test material surface.

  20. Using Phased Array Ultrasonic Testing in Lieu of Radiography for Acceptance of Carbon Steel Piping Welds

    SciTech Connect (OSTI)

    Moran, Traci L.; Anderson, Michael T.; Cinson, Anthony D.; Crawford, Susan L.; Nove, Carol A.

    2014-08-01

    The Pacific Northwest National Laboratory (PNNL) is conducting studies for the U.S. Nuclear Regulatory Commission (NRC) to assess the capability, effectiveness, and reliability of ultrasonic testing (UT) as a replacement method for radiographic testing (RT) for volumetric examination of nuclear power plant (NPP) components. This particular study focused on evaluating the use of UT on carbon steel plate welds. Welding fabrication flaws included a combination of planar and volumetric types, e.g., incomplete fusion, lack of penetration, cracks, porosity, and slag inclusions. The examinations were conducted using phased-array (PA) UT techniques applied primarily for detection and flaw type characterization. This paper will discuss the results of using UT in lieu of RT for detection and classification of fabrication flaws in carbon steel plate welds.

  1. Crack detection using resonant ultrasound spectroscopy

    DOE Patents [OSTI]

    Migliori, A.; Bell, T.M.; Rhodes, G.W.

    1994-10-04

    Method and apparatus are provided for detecting crack-like flaws in components. A plurality of exciting frequencies are generated and applied to a component in a dry condition to obtain a first ultrasonic spectrum of the component. The component is then wet with a selected liquid to penetrate any crack-like flaws in the component. The plurality of exciting frequencies are again applied to the component and a second ultrasonic spectrum of the component is obtained. The wet and dry ultrasonic spectra are then analyzed to determine the second harmonic components in each of the ultrasonic resonance spectra and the second harmonic components are compared to ascertain the presence of crack-like flaws in the component. 5 figs.

  2. Crack detection using resonant ultrasound spectroscopy

    DOE Patents [OSTI]

    Migliori, Albert (Santa Fe, NM); Bell, Thomas M. (Santa Fe, NM); Rhodes, George W. (Albuquerque, NM)

    1994-01-01

    Method and apparatus are provided for detecting crack-like flaws in components. A plurality of exciting frequencies are generated and applied to a component in a dry condition to obtain a first ultrasonic spectrum of the component. The component is then wet with a selected liquid to penetrate any crack-like flaws in the component. The plurality of exciting frequencies are again applied to the component and a second ultrasonic spectrum of the component is obtained. The wet and dry ultrasonic spectra are then analyzed to determine the second harmonic components in each of the ultrasonic resonance spectra and the second harmonic components are compared to ascertain the presence of crack-like flaws in the component.

  3. An Empirical Study on Ultrasonic Testing in Lieu of Radiography for Nuclear Power Plants

    SciTech Connect (OSTI)

    Moran, Traci L.; Pardini, Allan F.; Ramuhalli, Pradeep; Prowant, Matthew S.; Mathews, Royce

    2012-09-01

    Research is being conducted for the U.S. Nuclear Regulatory Commission (NRC) at the Pacific Northwest National Laboratory (PNNL) to assess the capability, effectiveness, and reliability of ultrasonic testing (UT) as a replacement method for radiographic testing (RT) for inspecting nuclear power plant (NPP) components. A primary objective of this work is to evaluate UT techniques to assess their ability to detect, locate, size, and characterize fabrication flaws in typical NPP weldments. This particular study focused on the evaluation of four carbon steel pipe-to-pipe welds on specimens that ranged in thicknesses from 19.05 mm (0.75 in.) to 27.8 mm (1.094 in.) and were 355.6 mm (14.0 in.) or 406.4 mm (16.0 in.) in diameter. The pipe welds contained both implanted (intentional) fabrication flaws as well as bonus (unintentional) flaws throughout the entire thickness of the weld and the adjacent base material. The fabrication flaws were a combination of planar and volumetric flaw types, including incomplete fusion, incomplete penetration, cracks, porosity, and slag inclusions. The examinations were conducted using phased-array UT (PA UT) techniques applied primarily for detection and length sizing of the flaws. Radiographic examinations were also conducted on the specimens with RT detection and length sizing results being used to establish true state. This paper will discuss the comparison of UT and RT (true state) detection results conducted to date along with a discussion on the technical gaps that need to be addressed before these methods can be used interchangeably for repair and replacement activities for NPP components.

  4. Results of fracture mechanics analyses of the ederer cranes in the device assembly

    SciTech Connect (OSTI)

    Dalder, E.

    1996-08-01

    Fracture mechanics analyses were conducted on three critical locations on the lower flange of the load-beam of the Ederer 5 ton and 4 ton cranes in the D.A.F. Facility. Based on these results, it appears that: 1. Propagation of a 5 mm long flaw, previously undetected by non-destructive examination (NDE), to a length sufficient to cause structural failure of either flange, should not occur in at least 100 times the postulated operating scenarios for each crane; 2. Should each crane undergo annual inspection, any surface flaw with a length greater that 20 mm should be removed and repaired by qualified and approved repair procedures.

  5. Non-destructive testing method and apparatus utilizing phase multiplication holography

    DOE Patents [OSTI]

    Collins, H. Dale (Richland, WA); Prince, James M. (Kennewick, WA); Davis, Thomas J. (Richland, WA)

    1984-01-01

    An apparatus and method for imaging of structural characteristics in test objects using radiation amenable to coherent signal processing methods. Frequency and phase multiplication of received flaw signals is used to simulate a test wavelength at least one to two orders of magnitude smaller than the actual wavelength. The apparent reduction in wavelength between the illumination and recording radiation performs a frequency translation hologram. The hologram constructed with a high synthetic frequency and flaw phase multiplication is similar to a conventional acoustic hologram construction at the high frequency.

  6. Method for resonant measurement

    DOE Patents [OSTI]

    Rhodes, George W. (5201 Rio Grande Blvd., N.W., Albuquerque, NM 87107); Migliori, Albert (Rte. 4, Box 258 Tano Rd., Sante Fe, NM 87501); Dixon, Raymond D. (396 Connie Ave., White Rock, NM 87544)

    1996-01-01

    A method of measurement of objects to determine object flaws, Poisson's ratio (.sigma.) and shear modulus (.mu.) is shown and described. First, the frequency for expected degenerate responses is determined for one or more input frequencies and then splitting of degenerate resonant modes are observed to identify the presence of flaws in the object. Poisson's ratio and the shear modulus can be determined by identification of resonances dependent only on the shear modulus, and then using that shear modulus to find Poisson's ratio using other modes dependent on both the shear modulus and Poisson's ratio.

  7. Method for resonant measurement

    DOE Patents [OSTI]

    Rhodes, G.W.; Migliori, A.; Dixon, R.D.

    1996-03-05

    A method of measurement of objects to determine object flaws, Poisson`s ratio ({sigma}) and shear modulus ({mu}) is shown and described. First, the frequency for expected degenerate responses is determined for one or more input frequencies and then splitting of degenerate resonant modes are observed to identify the presence of flaws in the object. Poisson`s ratio and the shear modulus can be determined by identification of resonances dependent only on the shear modulus, and then using that shear modulus to find Poisson`s ratio using other modes dependent on both the shear modulus and Poisson`s ratio. 1 fig.

  8. Photo Gallery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laser Bay <h3>Programmable Spatial Shaper</h3>A system of customized spatial light modulators called "spatial shapers" has been installed in the preamplifier modules (PAMs) at the front end of the NIF laser system. The spatial shapers can obscure the laser light at programmed locations within the beam profile to keep the light from striking small, isolated flaws on downstream optical components. Such flaws can act as small initiation sites for damage that could grow during

  9. Concurrent ultrasonic weld evaluation system

    DOE Patents [OSTI]

    Hood, D.W.; Johnson, J.A.; Smartt, H.B.

    1987-12-15

    A system for concurrent, non-destructive evaluation of partially completed welds for use in conjunction with an automated welder is disclosed. The system utilizes real time, automated ultrasonic inspection of a welding operation as the welds are being made by providing a transducer which follows a short distance behind the welding head. Reflected ultrasonic signals are analyzed utilizing computer based digital pattern recognition techniques to discriminate between good and flawed welds on a pass by pass basis. The system also distinguishes between types of weld flaws. 5 figs.

  10. Concurrent ultrasonic weld evaluation system

    DOE Patents [OSTI]

    Hood, D.W.; Johnson, J.A.; Smartt, H.B.

    1985-09-04

    A system for concurrent, non-destructive evaluation of partially completed welds for use in conjunction with an automated welder. The system utilizes real time, automated ultrasonic inspection of a welding operation as the welds are being made by providing a transducer which follows a short distance behind the welding head. Reflected ultrasonic signals are analyzed utilizing computer based digital pattern recognition techniques to discriminate between good and flawed welds on a pass by pass basis. The system also distinguishes between types of weld flaws.

  11. Concurrent ultrasonic weld evaluation system

    DOE Patents [OSTI]

    Hood, Donald W. (Idaho Falls, ID); Johnson, John A. (Idaho Falls, ID); Smartt, Herschel B. (Idaho Falls, ID)

    1987-01-01

    A system for concurrent, non-destructive evaluation of partially completed welds for use in conjunction with an automated welder. The system utilizes real time, automated ultrasonic inspection of a welding operation as the welds are being made by providing a transducer which follows a short distance behind the welding head. Reflected ultrasonic signals are analyzed utilizing computer based digital pattern recognition techniques to discriminate between good and flawed welds on a pass by pass basis. The system also distinguishes between types of weld flaws.

  12. Pacific Northwest Smart Grid Demonstration Project SUCCESS STORIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering. "Knowing there was an aging issue with one cable, we thought: let's look at demand response to reduce the load." Failing cable leads to fast launch By September 2010,...

  13. Do we get actual vendor name while we searched with zip code...

    Open Energy Info (EERE)

    let me know? Submitted by SUTHARI on 29 September, 2014 - 08:02 1 answer Points: 0 Hi SUTHARI, we had a bug in the U.S. Utility Rate Database affecting zip codes with leading...

  14. 11-2015 | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of freedom, and let us reconsecrate ourselves to the task of promoting an enduring peace so that their efforts shall not have been in vain." As Americans, we owe a tremendous...

  15. Y-12s Moon Box ? a big hit in Texas

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    not rub against anything that would mar its shiny finish. Then off it went to Texas. In planning this trip, I first considered shipping the Moon Box, but I did not want to let it...

  16. Using the NEW NX Service Yushu Yao NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7, 2011 Using X-Windows * X-Windows let you run graphical user programs (e.g. Emacs, Matlab) on NERSC Machines * We suggest you to use NX for much better X-Windows experience 9...

  17. Slide 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    14, 13 Using X-Windows * X-Windows let you run graphical user programs (e.g. Emacs, Matlab) on NERSC Machines * We suggest you to use NX for much better X-Windows experience 2...

  18. Using the NEW NX Service Yushu Yao NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for them Using X-Windows * X-Windows let you run graphical user programs (e.g. Emacs, Matlab) on NERSC Machines * We suggest you to use NX for much better X-Windows experience 9...

  19. X marks the spot: Researchers confirm novel method for controlling...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    much like changing the settings on iTunes or a stereo lets one explore the behavior of music. This discovery gives fusion researchers a tool to access different intrinsic rotation...

  20. Fascinating Fluids

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    If it gets sticky, dip it back into the solution. What is going on here? Don't let your ball dry on fabric or furniture. Borrow a disposable diaper from someone with a baby. Cut it...

  1. Microsoft Word - Another Way BPA, Request No. HQ-2012-01166-F...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    b5. If you need to see those, let me know. chris -----Original Message----- From: Fishman, Janet Sent: Wednesday, May 30, 2012 1:38 PM To: Morris, Alexander; Washington,...

  2. BPA-2015-01157-FOIA Request

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Kraby, David Sent: Monday, April 13, 2015 10:02 AM To: Winn,Kim S (BPA) - CGC-131 Subject: RE: Your Freedom of Information Act Request Thanks Lets only...

  3. DOE Zero Energy Home Webinar: Comprehensive Building Science...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home Webinar: Comprehensive Building Science (Text Version) DOE Zero Energy Home Webinar: ... So let's say that Dan Brown is doing a book reading, so there are lots of people inside, ...

  4. Solar Decathlon Opening | Department of Energy

    Office of Environmental Management (EM)

    Solar Decathlon Opening Solar Decathlon Opening October 6, 2005 - 12:25pm Addthis Remarks Prepared for Energy Secretary Bodman Let me begin by welcoming all of you to this Solar...

  5. BPA-2015-01325-FOIA Request

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Batista de Campos, 285 - Pq. Industrial Bandeirantes II Maring, PR CEP: 87070-080 - Brazil Please let me know if you need anything else. Xi Heverton F. Alto Engenharia Rua...

  6. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a DoS (Denial of Service), and compromise a user's system. February 14, 2013 V-091: Adobe AcrobatReader Bug Lets Remote Users Execute Arbitrary Code Adobe has identified...

  7. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A vulnerability was reported in McAfee VirusScan Enterprise. February 27, 2013 V-100: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  8. Energy-Savings Initiative Event | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    I am glad to be here with you, with Kevin Measel of Lowe's, and with the men and women of this Lowe's store to stress the importance of energy efficiency and conservation. And let ...

  9. OpL^^f-B^ JPL D-1085 D O Technical Information Report SP-100...

    Office of Scientific and Technical Information (OSTI)

    ... Several smsdler DOD contracts are expected to be in place shortly. Early in fiscal year 1984 a contract will be let by JPL to study civiliancommercial missions. NASA has also set ...

  10. J.W. Morris, Jr.

    Office of Scientific and Technical Information (OSTI)

    and how it may be best controlled. 1. Introduction The influence of grain size on the ... Let an array of identical dislocations pile up against a grain boundary under the ...

  11. Energy Saver 101: Home Cooling Infographic | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    While home cooling only accounts for 6 percent of the average home's energy use, it can lead to high energy bills during the warm months. This summer, don't let your energy bills...

  12. How the Membrane Protein AmtB Transports Ammonia

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the uncharged NH3 "gas." A Doorway for Letting Ammonia into Cells Like any factory, a biological cell takes in raw materials and energy and expels waste products. What goes in...

  13. QER- Comment of Pepco Holdings, Inc. 2

    Broader source: Energy.gov [DOE]

    Karen: Here are some of our initial thoughts on vulnerability questions for you to consider. Please let me know if you have other specific topics you want us to consider right now.

  14. It's Time to ACT | Department of Energy

    Energy Savers [EERE]

    Americans back to work in the process. There are plenty of actions we can take to reduce oil consumption. Let's start accepting and committing. What do you think? Is it time to...

  15. User-Friendly Model Puts Solar Energy in Your Backyard | OpenEI...

    Open Energy Info (EERE)

    a photovoltaic (PV) system for your home or property, check out the National Renewable Energy Laboratory's In My Backyard (IMBY) tool. It's quick, useful, and-let's just say...

  16. Federal Energy Management Program News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    energy projects. July 18, 2014 EPA Launches 2014 National Building Competition Let the battle begin The U.S. Environmental Protection Agency (EPA) in mid-July launched the 2014...

  17. Renewable Energy, Right in Your Back Yard | OpenEI Community

    Open Energy Info (EERE)

    select from "solar" or "wind" energy. Under solar, the application lets you draw your own solar panel square on the roof, input a few values (size, derating, tilt angle, Azimuth...

  18. DOE Tour of Zero: The Johns Island Custom by Amerisips Homes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    low-cost comfort. 15 of 26 Professionally installed high-performance windows let in light but keep out heat. 16 of 26 The air-to-water heat pump is integrated with a...

  19. BBAP ???for EH-53 v2.0

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security personnel Do not let your truck idle for more than 3 min (unless it is a concrete truck and pumper) Properly maintain and inspect your truck(s) daily for safety issues...

  20. BPA-2012-00477-FOIA Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Zehntbauer,Nicole R - TERG-3 Subject: Troutdale Substation dgn on Sharepoint Site Hello Let me know if you have any problems viewing the data. Thanks, Anne Anne K. Hillyer,...